1 |
B. Feng, A. Mera, and L. Lu."P2im: Scalable and hardware-independent fir mware testing via automatic peripheral interface modeling," USENIX 20, p p. 1237-1254, 2020
|
2 |
M. Muench, J. Stijohann, F. Kargl, A. Francillon, and D. Balzarotti. "What You Corrupt Is Not What You Crash: Challenges in fuzzing embedded de vices," NDSS, Jan. 2018.
|
3 |
A. A Clements, E. Gustafson, T. Scharnowski, P. Grosen, D. Fritz, C. Krue gel, G. Vigna, S. Bagchi,and M. Payer."Halucinator: Firmware re-hosting through abstraction layer emulation," USENIX 20, pp. 1201-1218, 2020.
|
4 |
E. Gustafson, M. Muench, C. Spensky, N. Redini, A. Machiry, Y. Fratantonio, D. Balzarotti, A. Francillon, Y. RynChoe, C. Kruegel, et al. "Toward the analysis of embedded firmware through automated re-hosting," RAID, pp. 135-150, Sep. 2019
|
5 |
Wei Zhou, Le Guan, Peng Liu, and Yuqing Zhang. "Automatic firmware emulation through invalidity-guided knowledge inference," USENIX 21, 2021.
|