-
1
Framework to analyze and exploit the smart home IoT firmware
Published 2025-02-01Subjects: Get full text
Article -
2
Hardcoded vulnerability detection approach for IoT device firmware
Published 2022-10-01“…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
Get full text
Article -
3
Backdoor detection in embedded system firmware without file system
Published 2013-08-01Subjects: Get full text
Article -
4
Firmware vulnerability analysis based on formal verification of software and hardware
Published 2016-07-01Subjects: “…firmware security…”
Get full text
Article -
5
Method for constructing function correspondence between firmware based on candidate function group
Published 2021-04-01Subjects: “…firmware…”
Get full text
Article -
6
IoT Firmware Emulation and Its Security Application in Fuzzing: A Critical Revisit
Published 2025-01-01Subjects: Get full text
Article -
7
Firmware protocol stack supporting remote boot and storage volumes mapping in IP-SAN
Published 2009-01-01Subjects: Get full text
Article -
8
Beamforming Feedback-Based Line-of-Sight Identification Toward Firmware-Agnostic WiFi Sensing
Published 2024-01-01Subjects: Get full text
Article -
9
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01Subjects: “…router firmware…”
Get full text
Article -
10
TPCM-based trusted PXE boot method for servers
Published 2020-12-01“…The PXE startup mechanism downloads operating system files through the network and starts the operating system,which is widely used in server network startup.It is widely used in server network startup.The PXE boot process is secured and trusted through trusted computing technology to prevent the PXE boot file from being tampered with maliciously,ensuring the safe and reliable operation of the server.The cyber security classified protection standard requires that the system boot program and system program of the server device be trusted and verified based on the trusted root.A TPCM-based server trusted PXE boot method based on the requirements of classified protection standard was proposed to ensure the security and trust of the server's BIOS firmware,PXE bootfiles,and Linux system files.When the server performs PXE boot,TPCM measured BIOS firmware,BIOS boot environment measured PXE boot files,and PXE boot environment measured Linux system files.Taking TPCM as the root of trust,one level of measurement,one level of trust,and a chain of trust were established to achieve a trusted server operating environment.The proposed method was tested on a domestically-controlled,self-controllable Shenwei server.The experimental results show that the proposed method is feasible.…”
Get full text
Article -
11
Framework Design for the Dynamic Reconfiguration of IoT-Enabled Embedded Systems and “On-the-Fly” Code Execution
Published 2025-01-01“…Both processes were fast and resource-efficient under normal conditions, supporting real-time updates with occasional outliers, suggesting room for optimization and also highlighting the advantages of VM-based firmware update methods, which outperform traditional approaches like Serial and OTA (Over-the-Air, the ability to update or configure firmware, software, or devices via wireless connection) updates by achieving lower latency and greater consistency. …”
Get full text
Article -
12
Hadoop-Based Distributed Sensor Node Management System
Published 2014-03-01“…Additionally, it provides a flexible management scheme for sensor node by reconfiguring firmware or updating configurations and data formats of sensor nodes based on mapreduce framework. …”
Get full text
Article -
13
Quantitative evaluation of fault propagation in a commercial cloud system
Published 2020-03-01“…These studies have been performed using inaccurate simulations instead of validating complete cloud software stacks (firmware, hypervisor, operating system hosts and workloads) as a whole. …”
Get full text
Article -
14
Comparative evaluation between Java application using JNI and native C/C++ application running on an Android platform.
Published 2025-01-01“…We conducted sequence of executions initiated either through a graphical interface or via the Android Debug Bridge (ADB) command line, with timing performed by external hardware with its own firmware for this evaluation. Based on the results, we observed that in all test cases, the native application performs faster, except when there are variations related to process scheduling, which may rarely lead to a reversal of this pattern. …”
Get full text
Article -
15
Stability of Bar Code Information Stored in Magnetic Nanowire Arrays
Published 2017-01-01“…Firmware applications such as security codes, magnetic keys, and similar products can be stored in magnetic bar codes similar to optical bar codes. …”
Get full text
Article -
16
Information security vulnerability scoring model for intelligent vehicles
Published 2022-02-01“…More and more electronic devices are integrated into the modern vehicles with the development of intelligent vehicles.There are various design flaws and vulnerabilities hidden in a large number of hardware, firmware and software.Therefore, the vulnerabilities of intelligent vehicles have become the most important factor affecting the vehicle safety.The safety of vehicles is seriously affected by the disclosure of a large number of vulnerabilities, and the wide application of smart cars is also restricted.Vulnerability management is an effective method to reduce the risk of vulnerabilities and improve vehicle security.And vulnerability scoring is one the important step in vulnerability management procedure.However, current method have no capability assessing automotive vulnerabilities reasonably.In order to handle this problem, a vulnerability scoring model for intelligent vehicles was proposed, which was based on CVSS.The attack vector and attack complexity were optimized, and property security, privacy security, functional safety and life safety were added to characterize the possible impact of the vulnerabilities according to the characteristics of intelligent vehicles.With the machine learning method, the parameters in CVSS scoring formula were optimized to describe the characteristics of intelligent vehicle vulnerabilities and adapt to the adjusted and new added weights.It is found in case study and statistics that the diversity and distribution of the model are better than CVSS, which means the model can better score different vulnerabilities.And then AHP is used to evaluate the vulnerability of the whole vehicle based on the vulnerability score of the model, a score is given representing the risk level of whole vehicle.The proposed model can be used to evaluate the severity of information security vulnerabilities in intelligent vehicles and assess the security risks of the entire vehicle or part of the system reasonably, which can provide an evidence for fixing the vulnerabilities or reinforcing the entire vehicle.…”
Get full text
Article -
17
Method of flight operation of software and hardware for controlling parameters of the rotational motion of small spacecraft of the Aist series
Published 2018-10-01“…The paper presents a methodology for flight operation of firmware intended for monitoring the parameters of the rotational motion of a small spacecraft. …”
Get full text
Article -
18
Orientações para utilização de acelerômetros no Brasil
Published 2017-03-01“…Com base nesses estudos, buscou-se apresentar orientações para as fases pré-coleta (seleção do acelerômetro; testagem da calibração dos acelerômetros, atualização de firmware; estudo piloto; e definição de protocolo), coleta (distribuição dos acelerômetros; contato com participantes; e devolução dos acelerômetros) e pós-coleta (processamento; transformação e interpretação dos dados; e comparabilidade dos dados) do uso de acelerômetros. …”
Get full text
Article -
19
Biosensors and their widespread impact on human health
Published 2024-01-01“…It examines fourteen key applications of Biosensors in the medical field, highlighting the integration of biomedical devices, apps, firmware, and advanced algorithms. These developments pave the way for innovative medical therapies, real-time evidence-based insights, customized solutions, and informed guidance, shaping a bright future for healthcare.…”
Get full text
Article -
20
Development of an ISOBUS-compliant communication node for multiple machine vision systems on wide boom sprayers for nozzle control in spot application schemes
Published 2025-03-01“…A threaded client-server firmware incorporates a checksum verification subroutine to ensure reliable protocol message handling, followed by message queuing for uninterrupted real-time processing. …”
Get full text
Article