메뉴 건너뛰기




Volumn , Issue , 2014, Pages

Avatar: A Framework to Support Dynamic Security Analysis of Embedded Systems’ Firmwares

Author keywords

[No Author keywords available]

Indexed keywords

FIRMWARE; MOBILE SECURITY; REVERSE ENGINEERING; SECURITY SYSTEMS; SENSOR NODES; STATIC ANALYSIS;

EID: 84977858742     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.14722/ndss/2014.23229     Document Type: Conference Paper
Times cited : (298)

References (60)
  • 2
    • 85180629253 scopus 로고    scopus 로고
    • OsmocomBB. http://bb.osmocom.org/trac/.
    • OsmocomBB
  • 4
    • 79955561437 scopus 로고    scopus 로고
    • IEEE-ISTO 5001 - 2003 the nexus 5001 forum standard for a global embedded processor debug interface
    • December
    • IEEE-ISTO 5001 - 2003 the nexus 5001 forum standard for a global embedded processor debug interface. IEEE - Industry Standards and Technology Organization, December 2003.
    • (2003) IEEE - Industry Standards and Technology Organization
  • 5
    • 85180632251 scopus 로고    scopus 로고
    • CWSandbox, 2008. http://www.cwsandbox.org.
    • (2008) CWSandbox
  • 10
    • 67650790221 scopus 로고    scopus 로고
    • KLEE unassisted and automatic generation of high-coverage tests for complex systems programs
    • CADAR, C., DUNBAR, D., AND ENGLER, D. KLEE unassisted and automatic generation of high-coverage tests for complex systems programs. In OSDI (2008).
    • (2008) OSDI
    • CADAR, C.1    DUNBAR, D.2    ENGLER, D.3
  • 15
    • 84859090239 scopus 로고    scopus 로고
    • The S2E Platform: Design, Implementation, and Applications
    • (Feb), 2:1–2:49
    • CHIPOUNOV, V., KUZNETSOV, V., AND CANDEA, G. The S2E Platform: Design, Implementation, and Applications. ACM Trans. Comput. Syst. 30, 1 (Feb. 2012), 2:1–2:49.
    • (2012) ACM Trans. Comput. Syst , vol.30 , Issue.1
    • CHIPOUNOV, V.1    KUZNETSOV, V.2    CANDEA, G.3
  • 18
    • 0020141260 scopus 로고
    • Exception handling and software fault tolerance
    • CRISTIAN, F. Exception handling and software fault tolerance. IEEE Transactions on Computers C-31, 6 (1982), 531–540.
    • (1982) IEEE Transactions on Computers C-31 , Issue.6 , pp. 531-540
    • CRISTIAN, F.1
  • 19
    • 85091294952 scopus 로고    scopus 로고
    • When firmware modifications attack: A case study of embedded exploitation
    • San Diego, California, USA, February 24-27, (2013), The Internet Society
    • CUI, A., COSTELLO, M., AND STOLFO, S. J. When firmware modifications attack: A case study of embedded exploitation. In 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013 (2013), The Internet Society.
    • (2013) 20th Annual Network and Distributed System Security Symposium, NDSS 2013
    • CUI, A.1    COSTELLO, M.2    STOLFO, S. J.3
  • 22
    • 85075533110 scopus 로고    scopus 로고
    • FIE on firmware: Finding vulnerabilities in embedded systems using symbolic execution
    • (Washington, DC, August)
    • DAVIDSON, D., MOENCH, B., JHA, S., AND RISTENPART, T. FIE on firmware: Finding vulnerabilities in embedded systems using symbolic execution. In Proceedings of the USENIX Security Symposium (Washington, DC, August 2013).
    • (2013) Proceedings of the USENIX Security Symposium
    • DAVIDSON, D.1    MOENCH, B.2    JHA, S.3    RISTENPART, T.4
  • 24
    • 84858392040 scopus 로고    scopus 로고
    • A survey on automated dynamic malware-analysis techniques and tools
    • (Mar), 6:1–6:42
    • EGELE, M., SCHOLTE, T., KIRDA, E., AND KRUEGEL, C. A survey on automated dynamic malware-analysis techniques and tools. ACM Comput. Surv. 44, 2 (Mar. 2008), 6:1–6:42.
    • (2008) ACM Comput. Surv , vol.44 , Issue.2
    • EGELE, M.1    SCHOLTE, T.2    KIRDA, E.3    KRUEGEL, C.4
  • 30
    • 84954469022 scopus 로고    scopus 로고
    • Dowsing for overflows: A guided fuzzer to find buffer boundary violations
    • (Washington, DC, August), USENIX
    • HALLER, I., SLOWINSKA, A., NEUGSCHWANDTNER, M., AND BOS, H. Dowsing for overflows: A guided fuzzer to find buffer boundary violations. In Proceedings of USENIX Security’13 (Washington, DC, August 2013), USENIX.
    • (2013) Proceedings of USENIX Security’13
    • HALLER, I.1    SLOWINSKA, A.2    NEUGSCHWANDTNER, M.3    BOS, H.4
  • 35
    • 55349134527 scopus 로고    scopus 로고
    • Hardware-software approaches to in-circuit emulation for embedded processors
    • KAO, C.-F., HUANG, I.-J., AND CHEN, H.-M. Hardware-software approaches to in-circuit emulation for embedded processors. Design Test of Computers, IEEE 25, 5 (2008), 462–477.
    • (2008) Design Test of Computers, IEEE , vol.25 , Issue.5 , pp. 462-477
    • KAO, C.-F.1    HUANG, I.-J.2    CHEN, H.-M.3
  • 42
    • 0031364664 scopus 로고    scopus 로고
    • Emulation techniques for microcontrollers
    • MELEAR, C. Emulation techniques for microcontrollers. In Wescon/97. Conference Proceedings (1997), pp. 532–541.
    • (1997) Wescon/97. Conference Proceedings , pp. 532-541
    • MELEAR, C.1
  • 44
  • 46
    • 78651389795 scopus 로고    scopus 로고
    • Can you still trust your network card?
    • CanSecWest
    • PEREZ, Y.-A., AND DUFLOT, L. Can you still trust your network card? CanSecWest 2010.
    • (2010)
    • PEREZ, Y.-A.1    DUFLOT, L.2
  • 49
    • 77950801061 scopus 로고    scopus 로고
    • Model checking of software for microcontrollers
    • (Apr), 36:1–36:27
    • SCHLICH, B. Model checking of software for microcontrollers. ACM Trans. Embed. Comput. Syst. 9, 4 (Apr. 2010), 36:1–36:27.
    • (2010) ACM Trans. Embed. Comput. Syst , vol.9 , Issue.4
    • SCHLICH, B.1
  • 50
    • 84884527765 scopus 로고    scopus 로고
    • Inferring invariants by symbolic execution
    • B. Beckert, Ed., of CEUR Workshop Proceedings, CEUR-WS.org
    • SCHMITT, P. H., AND WEISS, B. Inferring invariants by symbolic execution. In Proceedings, 4th International Verification Workshop (VERIFY’07) (2007), B. Beckert, Ed., vol. 259 of CEUR Workshop Proceedings, CEUR-WS.org, pp. 195–210.
    • (2007) Proceedings, 4th International Verification Workshop (VERIFY’07) , vol.259 , pp. 195-210
    • SCHMITT, P. H.1    WEISS, B.2
  • 51
    • 77955182005 scopus 로고    scopus 로고
    • All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)
    • (Washington, DC, USA), SP’10, IEEE Computer Society
    • SCHWARTZ, E. J., AVGERINOS, T., AND BRUMLEY, D. All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask). In Proceedings of the 2010 IEEE Symposium on Security and Privacy (Washington, DC, USA, 2010), SP’10, IEEE Computer Society, pp. 317–331.
    • (2010) Proceedings of the 2010 IEEE Symposium on Security and Privacy , pp. 317-331
    • SCHWARTZ, E. J.1    AVGERINOS, T.2    BRUMLEY, D.3
  • 55
    • 77955183968 scopus 로고    scopus 로고
    • TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
    • WANG, T., WEI, T., GU, G., AND ZOU, W. TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection. In IEEE Symposium on Security and Privacy (2010), pp. 497–512.
    • (2010) IEEE Symposium on Security and Privacy , pp. 497-512
    • WANG, T.1    WEI, T.2    GU, G.3    ZOU, W.4
  • 56
    • 85084163551 scopus 로고    scopus 로고
    • Baseband attacks: remote exploitation of memory corruptions in cellular protocol stacks
    • (Berkeley, CA, USA), WOOT’12, USENIX Association
    • WEINMANN, R.-P. Baseband attacks: remote exploitation of memory corruptions in cellular protocol stacks. In Proceedings of the 6th USENIX conference on Offensive Technologies (Berkeley, CA, USA, 2012), WOOT’12, USENIX Association, pp. 2–2.
    • (2012) Proceedings of the 6th USENIX conference on Offensive Technologies , pp. 2-2
    • WEINMANN, R.-P.1
  • 59
    • 0038684791 scopus 로고    scopus 로고
    • A”flight data recorder” for enabling full-system multiprocessor deterministic replay
    • (New York, NY, USA), ISCA’03, ACM
    • XU, M., BODIK, R., AND HILL, M. D. A”flight data recorder” for enabling full-system multiprocessor deterministic replay. In Proceedings of the 30th annual international symposium on Computer architecture (New York, NY, USA, 2003), ISCA’03, ACM, pp. 122–135.
    • (2003) Proceedings of the 30th annual international symposium on Computer architecture , pp. 122-135
    • XU, M.1    BODIK, R.2    HILL, M. D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.