-
1
-
-
85180743925
-
-
[Online]. Available
-
“Binwalk.” [Online]. Available: http://binwalk.org/
-
Binwalk
-
-
-
2
-
-
84936753998
-
-
[Online]. Available
-
“Metasploit.” [Online]. Available: http://www.metasploit. com/
-
Metasploit
-
-
-
3
-
-
84870623596
-
-
[Online]. Available
-
“Nmap security scanner.” [Online]. Available: https: //nmap.org/
-
Nmap security scanner
-
-
-
4
-
-
85063636742
-
QEMU, a fast and portable dynamic translator
-
USENIX, [Online]. Available
-
F. Bellard, “QEMU, a fast and portable dynamic translator,” in Proceedings of the USENIX 2005 Annual Technical Conference. USENIX, 2005, pp. 41-46. [Online]. Available: https://www.usenix.org/legacy/publications/ library/proceedings/usenix05/tech/freenix/bellard.html
-
(2005)
Proceedings of the USENIX 2005 Annual Technical Conference
, pp. 41-46
-
-
Bellard, F.1
-
5
-
-
75749147262
-
A few billion lines of code later
-
[Online]. Available
-
A. Bessey, K. Block, B. Chelf, A. Chou, B. Fulton, S. Hallem, C. Henri-Gros, A. Kamsky, S. McPeak, and D. Engler, “A few billion lines of code later,” Communications of the ACM, vol. 53, no. 2, pp. 66-75, 2010. [Online]. Available: http://portal.acm.org/citation. cfm?doid=1646353.1646374
-
(2010)
Communications of the ACM
, vol.53
, Issue.2
, pp. 66-75
-
-
Bessey, A.1
Block, K.2
Chelf, B.3
Chou, A.4
Fulton, B.5
Hallem, S.6
Henri-Gros, C.7
Kamsky, A.8
McPeak, S.9
Engler, D.10
-
6
-
-
85084163455
-
Illuminating the security issues surrounding lights-out server management
-
USENIX, [Online]. Available
-
A. Bonkoski, R. Bielawski, and J. A. Halderman, “Illuminating the security issues surrounding lights-out server management,” in Proceedings of the 7th USENIX Workshop on Offensive Technologies. USENIX, 2013, pp. 1-9. [Online]. Available: https://www.usenix.org/conference/woot13/ workshop-program/presentation/bonkoski
-
(2013)
Proceedings of the 7th USENIX Workshop on Offensive Technologies
, pp. 1-9
-
-
Bonkoski, A.1
Bielawski, R.2
Halderman, J. A.3
-
7
-
-
85076893888
-
KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs
-
USENIX, [Online]. Available
-
C. Cadar, D. Dunbar, and D. Engler, “KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs,” in Proceedings of the 8th USENIX Symposium on Operating System Design and Implementation. USENIX, 2008, pp. 209-224. [Online]. Available: https://www.usenix.org/legacy/events/osdi08/ tech/
-
(2008)
Proceedings of the 8th USENIX Symposium on Operating System Design and Implementation
, pp. 209-224
-
-
Cadar, C.1
Dunbar, D.2
Engler, D.3
-
8
-
-
85069154879
-
A large-scale analysis of the security of embedded firmwares
-
USENIX, [Online]. Available
-
A. Costin, J. Zaddach, A. Francillon, and D. Balzarotti, “A large-scale analysis of the security of embedded firmwares,” in Proceedings of the 23rd USENIX Security Symposium. USENIX, 2014, pp. 95-110. [Online]. Available: https://www.usenix.org/conference/ usenixsecurity14/technical-sessions/presentation/costin
-
(2014)
Proceedings of the 23rd USENIX Security Symposium
, pp. 95-110
-
-
Costin, A.1
Zaddach, J.2
Francillon, A.3
Balzarotti, D.4
-
9
-
-
85091294952
-
When firmware modifications attack: A case study of embedded exploitation
-
The Internet Society, [Online]. Available
-
A. Cui, M. Costello, and S. J. Stolfo, “When firmware modifications attack: A case study of embedded exploitation,” in Proceedings of the 20th Annual Network and Distributed System Security Symposium. The Internet Society, 2013. [Online]. Available: http://www.internetsociety.org/doc/when-firmwaremodifications- attack-case-study-embedded-exploitation
-
(2013)
Proceedings of the 20th Annual Network and Distributed System Security Symposium
-
-
Cui, A.1
Costello, M.2
Stolfo, S. J.3
-
10
-
-
78751540482
-
A quantitative analysis of the insecurity of embedded network devices: Results of a wide-area scan
-
[Online]. Available
-
A. Cui and S. J. Stolfo, “A quantitative analysis of the insecurity of embedded network devices: Results of a wide-area scan,” in Proceedings of the 26th Annual Computer Security Applications Conference, 2010, pp. 97-106. [Online]. Available: http://www.scopus.com/ inward/record.url?eid=2-s2.0-78751540482&partnerID= 40&md5=759904ebe0eca35e4297072f7224cf55
-
(2010)
Proceedings of the 26th Annual Computer Security Applications Conference
, pp. 97-106
-
-
Cui, A.1
Stolfo, S. J.2
-
11
-
-
85075533110
-
FIE on firmware: Finding vulnerabilities in embedded systems using symbolic execution finding vulnerabilities in embedded systems using symbolic execution
-
USENIX, [Online]. Available
-
D. Davidson, B. Moench, S. Jha, and T. Ristenpart, “FIE on firmware: Finding vulnerabilities in embedded systems using symbolic execution finding vulnerabilities in embedded systems using symbolic execution,” in Proceedings of the 22nd USENIX Security Symposium. USENIX, 2013, pp. 463-478. [Online]. Available: https://www.usenix.org/conference/ usenixsecurity13/technical-sessions/paper/davidson
-
(2013)
Proceedings of the 22nd USENIX Security Symposium
, pp. 463-478
-
-
Davidson, D.1
Moench, B.2
Jha, S.3
Ristenpart, T.4
-
13
-
-
85064040125
-
ZMap: Fast internet-wide scanning and its security applications
-
USENIX, [Online]. Available
-
Z. Durumeric, E. Wustrow, and J. A. Halderman, “ZMap: Fast internet-wide scanning and its security applications,” in Proceedings of the 22nd USENIX Security Symposium. USENIX, 2013, pp. 605-619. [Online]. Available: https://www.usenix.org/conference/ usenixsecurity13/technical-sessions/paper/durumeric
-
(2013)
Proceedings of the 22nd USENIX Security Symposium
, pp. 605-619
-
-
Durumeric, Z.1
Wustrow, E.2
Halderman, J. A.3
-
14
-
-
85076227028
-
Mining your Ps and Qs: Detection of widespread weak keys in network devices
-
USENIX, [Online]. Available
-
N. Heninger, Z. Durumeric, E. Wustrow, and J. A. Halderman, “Mining your Ps and Qs: Detection of widespread weak keys in network devices,” in Proceedings of the 21st USENIX Security Symposium. USENIX, 2012, pp. 205-220. [Online]. Available: https://www.usenix.org/conference/usenixsecurity12/ technical-sessions/presentation/heninger
-
(2012)
Proceedings of the 21st USENIX Security Symposium
, pp. 205-220
-
-
Heninger, N.1
Durumeric, Z.2
Wustrow, E.3
Halderman, J. A.4
-
15
-
-
79956054973
-
FEMU: A firmware-based emulation framework for SoC verification
-
IEEE, [Online]. Available
-
H. Li, D. Tong, K. Huang, and X. Cheng, “FEMU: A firmware-based emulation framework for SoC verification,” in Proceedings of the 2010 IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis, no. 257. IEEE, 2010, pp. 257-266. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs_all. jsp?arnumber=5751510&tag=1
-
(2010)
Proceedings of the 2010 IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis
, Issue.257
, pp. 257-266
-
-
Li, H.1
Tong, D.2
Huang, K.3
Cheng, X.4
-
16
-
-
85084162463
-
Mouse trap: Exploiting firmware updates in USB peripherals
-
USENIX, [Online]. Available
-
J. Maskiewicz, B. Ellis, J. Mouradian, and H. Shacham, “Mouse trap: Exploiting firmware updates in USB peripherals,” in Proceedings of the 8th USENIX Workshop on Offensive Technologies. USENIX, 2014, pp. 1-10. [Online]. Available: https://www.usenix.org/conference/ woot14/workshop-program/presentation/maskiewicz
-
(2014)
Proceedings of the 8th USENIX Workshop on Offensive Technologies
, pp. 1-10
-
-
Maskiewicz, J.1
Ellis, B.2
Mouradian, J.3
Shacham, H.4
-
18
-
-
85084163551
-
Baseband attacks: Remote exploitation of memory corruptions in cellular protocol stacks
-
USENIX, [Online]. Available
-
R.-P. Weinmann, “Baseband attacks: Remote exploitation of memory corruptions in cellular protocol stacks,” in Proceedings of the 6th USENIX Workshop on Offensive Technologies. USENIX, 2012, pp. 1-10. [Online]. Available: https://www.usenix.org/conference/ woot12/workshop-program/presentation/weinmann
-
(2012)
Proceedings of the 6th USENIX Workshop on Offensive Technologies
, pp. 1-10
-
-
Weinmann, R.-P.1
-
19
-
-
84977858742
-
Avatar: A framework to support dynamic security analysis of embedded systems’ firmwares
-
The Internet Society, [Online]. Available
-
J. Zaddach, L. Bruno, A. Francillon, and D. Balzarotti, “Avatar: A framework to support dynamic security analysis of embedded systems’ firmwares,” in Proceedings of the 2014 Network and Distributed System Security Symposium. The Internet Society, 2014, pp. 23-26. [Online]. Available: http://dx.doi.org/10.14722/ndss.2014.23229
-
(2014)
Proceedings of the 2014 Network and Distributed System Security Symposium
, pp. 23-26
-
-
Zaddach, J.1
Bruno, L.2
Francillon, A.3
Balzarotti, D.4
|