메뉴 건너뛰기




Volumn , Issue , 2016, Pages

Towards Automated Dynamic Analysis for Linux-based Embedded Firmware

Author keywords

[No Author keywords available]

Indexed keywords

IMAGE PROCESSING; LINUX; PERSONAL COMPUTING; ROUTERS; SCALABILITY;

EID: 85169465657     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.14722/ndss.2016.23415     Document Type: Conference Paper
Times cited : (329)

References (19)
  • 1
    • 85180743925 scopus 로고    scopus 로고
    • [Online]. Available
    • “Binwalk.” [Online]. Available: http://binwalk.org/
    • Binwalk
  • 2
    • 84936753998 scopus 로고    scopus 로고
    • [Online]. Available
    • “Metasploit.” [Online]. Available: http://www.metasploit. com/
    • Metasploit
  • 3
    • 84870623596 scopus 로고    scopus 로고
    • [Online]. Available
    • “Nmap security scanner.” [Online]. Available: https: //nmap.org/
    • Nmap security scanner
  • 4
    • 85063636742 scopus 로고    scopus 로고
    • QEMU, a fast and portable dynamic translator
    • USENIX, [Online]. Available
    • F. Bellard, “QEMU, a fast and portable dynamic translator,” in Proceedings of the USENIX 2005 Annual Technical Conference. USENIX, 2005, pp. 41-46. [Online]. Available: https://www.usenix.org/legacy/publications/ library/proceedings/usenix05/tech/freenix/bellard.html
    • (2005) Proceedings of the USENIX 2005 Annual Technical Conference , pp. 41-46
    • Bellard, F.1
  • 6
    • 85084163455 scopus 로고    scopus 로고
    • Illuminating the security issues surrounding lights-out server management
    • USENIX, [Online]. Available
    • A. Bonkoski, R. Bielawski, and J. A. Halderman, “Illuminating the security issues surrounding lights-out server management,” in Proceedings of the 7th USENIX Workshop on Offensive Technologies. USENIX, 2013, pp. 1-9. [Online]. Available: https://www.usenix.org/conference/woot13/ workshop-program/presentation/bonkoski
    • (2013) Proceedings of the 7th USENIX Workshop on Offensive Technologies , pp. 1-9
    • Bonkoski, A.1    Bielawski, R.2    Halderman, J. A.3
  • 7
    • 85076893888 scopus 로고    scopus 로고
    • KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs
    • USENIX, [Online]. Available
    • C. Cadar, D. Dunbar, and D. Engler, “KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs,” in Proceedings of the 8th USENIX Symposium on Operating System Design and Implementation. USENIX, 2008, pp. 209-224. [Online]. Available: https://www.usenix.org/legacy/events/osdi08/ tech/
    • (2008) Proceedings of the 8th USENIX Symposium on Operating System Design and Implementation , pp. 209-224
    • Cadar, C.1    Dunbar, D.2    Engler, D.3
  • 8
    • 85069154879 scopus 로고    scopus 로고
    • A large-scale analysis of the security of embedded firmwares
    • USENIX, [Online]. Available
    • A. Costin, J. Zaddach, A. Francillon, and D. Balzarotti, “A large-scale analysis of the security of embedded firmwares,” in Proceedings of the 23rd USENIX Security Symposium. USENIX, 2014, pp. 95-110. [Online]. Available: https://www.usenix.org/conference/ usenixsecurity14/technical-sessions/presentation/costin
    • (2014) Proceedings of the 23rd USENIX Security Symposium , pp. 95-110
    • Costin, A.1    Zaddach, J.2    Francillon, A.3    Balzarotti, D.4
  • 9
    • 85091294952 scopus 로고    scopus 로고
    • When firmware modifications attack: A case study of embedded exploitation
    • The Internet Society, [Online]. Available
    • A. Cui, M. Costello, and S. J. Stolfo, “When firmware modifications attack: A case study of embedded exploitation,” in Proceedings of the 20th Annual Network and Distributed System Security Symposium. The Internet Society, 2013. [Online]. Available: http://www.internetsociety.org/doc/when-firmwaremodifications- attack-case-study-embedded-exploitation
    • (2013) Proceedings of the 20th Annual Network and Distributed System Security Symposium
    • Cui, A.1    Costello, M.2    Stolfo, S. J.3
  • 10
    • 78751540482 scopus 로고    scopus 로고
    • A quantitative analysis of the insecurity of embedded network devices: Results of a wide-area scan
    • [Online]. Available
    • A. Cui and S. J. Stolfo, “A quantitative analysis of the insecurity of embedded network devices: Results of a wide-area scan,” in Proceedings of the 26th Annual Computer Security Applications Conference, 2010, pp. 97-106. [Online]. Available: http://www.scopus.com/ inward/record.url?eid=2-s2.0-78751540482&partnerID= 40&md5=759904ebe0eca35e4297072f7224cf55
    • (2010) Proceedings of the 26th Annual Computer Security Applications Conference , pp. 97-106
    • Cui, A.1    Stolfo, S. J.2
  • 11
    • 85075533110 scopus 로고    scopus 로고
    • FIE on firmware: Finding vulnerabilities in embedded systems using symbolic execution finding vulnerabilities in embedded systems using symbolic execution
    • USENIX, [Online]. Available
    • D. Davidson, B. Moench, S. Jha, and T. Ristenpart, “FIE on firmware: Finding vulnerabilities in embedded systems using symbolic execution finding vulnerabilities in embedded systems using symbolic execution,” in Proceedings of the 22nd USENIX Security Symposium. USENIX, 2013, pp. 463-478. [Online]. Available: https://www.usenix.org/conference/ usenixsecurity13/technical-sessions/paper/davidson
    • (2013) Proceedings of the 22nd USENIX Security Symposium , pp. 463-478
    • Davidson, D.1    Moench, B.2    Jha, S.3    Ristenpart, T.4
  • 13
    • 85064040125 scopus 로고    scopus 로고
    • ZMap: Fast internet-wide scanning and its security applications
    • USENIX, [Online]. Available
    • Z. Durumeric, E. Wustrow, and J. A. Halderman, “ZMap: Fast internet-wide scanning and its security applications,” in Proceedings of the 22nd USENIX Security Symposium. USENIX, 2013, pp. 605-619. [Online]. Available: https://www.usenix.org/conference/ usenixsecurity13/technical-sessions/paper/durumeric
    • (2013) Proceedings of the 22nd USENIX Security Symposium , pp. 605-619
    • Durumeric, Z.1    Wustrow, E.2    Halderman, J. A.3
  • 14
    • 85076227028 scopus 로고    scopus 로고
    • Mining your Ps and Qs: Detection of widespread weak keys in network devices
    • USENIX, [Online]. Available
    • N. Heninger, Z. Durumeric, E. Wustrow, and J. A. Halderman, “Mining your Ps and Qs: Detection of widespread weak keys in network devices,” in Proceedings of the 21st USENIX Security Symposium. USENIX, 2012, pp. 205-220. [Online]. Available: https://www.usenix.org/conference/usenixsecurity12/ technical-sessions/presentation/heninger
    • (2012) Proceedings of the 21st USENIX Security Symposium , pp. 205-220
    • Heninger, N.1    Durumeric, Z.2    Wustrow, E.3    Halderman, J. A.4
  • 17
    • 84973362579 scopus 로고    scopus 로고
    • [Online]. Available
    • K. Nohl and J. Lell, “BadUSB-on accessories that turn evil,” 2014. [Online]. Available: https://www.blackhat.com/us-14/briefings.html# badusb-on-accessories-that-turn-evil
    • (2014) BadUSB-on accessories that turn evil
    • Nohl, K.1    Lell, J.2
  • 18
    • 85084163551 scopus 로고    scopus 로고
    • Baseband attacks: Remote exploitation of memory corruptions in cellular protocol stacks
    • USENIX, [Online]. Available
    • R.-P. Weinmann, “Baseband attacks: Remote exploitation of memory corruptions in cellular protocol stacks,” in Proceedings of the 6th USENIX Workshop on Offensive Technologies. USENIX, 2012, pp. 1-10. [Online]. Available: https://www.usenix.org/conference/ woot12/workshop-program/presentation/weinmann
    • (2012) Proceedings of the 6th USENIX Workshop on Offensive Technologies , pp. 1-10
    • Weinmann, R.-P.1
  • 19
    • 84977858742 scopus 로고    scopus 로고
    • Avatar: A framework to support dynamic security analysis of embedded systems’ firmwares
    • The Internet Society, [Online]. Available
    • J. Zaddach, L. Bruno, A. Francillon, and D. Balzarotti, “Avatar: A framework to support dynamic security analysis of embedded systems’ firmwares,” in Proceedings of the 2014 Network and Distributed System Security Symposium. The Internet Society, 2014, pp. 23-26. [Online]. Available: http://dx.doi.org/10.14722/ndss.2014.23229
    • (2014) Proceedings of the 2014 Network and Distributed System Security Symposium , pp. 23-26
    • Zaddach, J.1    Bruno, L.2    Francillon, A.3    Balzarotti, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.