[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Xue et al., 2024 - Google Patents

Update If You Dare: Demystifying Bare-Metal Device Firmware Update Security of Appified IoT Systems

Xue et al., 2024

Document ID
1346040151763256608
Author
Xue L
Yan Y
Tang Q
Yu L
Luo X
Cai Z
Nie S
Wu S
Gu G
Wang C
Publication year
Publication venue
IEEE Transactions on Dependable and Secure Computing

External Links

Snippet

Due to the economy and low power consumption features, bare-metal IoT devices have been widely used in various areas of our life, and they are usually paired with companion mobile apps to configure them and view their states (aka, appified IoT system). The IoT …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action

Similar Documents

Publication Publication Date Title
Chen et al. IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing.
Rahaman et al. Cryptoguard: High precision detection of cryptographic vulnerabilities in massive-sized java projects
Cheng et al. DTaint: detecting the taint-style vulnerability in embedded device firmware
Lu et al. Chex: statically vetting android apps for component hijacking vulnerabilities
Liu et al. On manually reverse engineering communication protocols of linux-based iot systems
Spreitzenbarth et al. Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques
Neuner et al. Enter sandbox: Android sandbox comparison
Zhang et al. {CryptoREX}: Large-scale analysis of cryptographic misuse in {IoT} devices
Ali-Gombe et al. Toward a more dependable hybrid analysis of android malware using aspect-oriented programming
Yang et al. Automated generation of event-oriented exploits in android hybrid apps
Botacin et al. Antiviruses under the microscope: A hands-on perspective
Ibrahim et al. SafetyNOT: on the usage of the SafetyNet attestation API in Android
CN108595950A (en) A kind of safe Enhancement Methods of SGX of combination remote authentication
Yang et al. Vetting Single {Sign-On}{SDK} Implementations via Symbolic Reasoning
Yankson et al. Security assessment for Zenbo robot using Drozer and mobSF frameworks
Bakhshi et al. A Review of IoT Firmware Vulnerabilities and Auditing Techniques
He et al. Toward hybrid static-dynamic detection of vulnerabilities in IoT firmware
Liu et al. Security analysis of vendor customized code in firmware of embedded device
Hei et al. Two vulnerabilities in Android OS kernel
CN115048630A (en) Integrity verification method and device of application program, storage medium and electronic equipment
Tang et al. Ssldetecter: detecting SSL security vulnerabilities of android applications based on a novel automatic traversal method
Shwartz et al. Inner conflict: How smart device components can cause harm
Park et al. A-pot: a comprehensive android analysis platform based on container technology
Xue et al. Update If You Dare: Demystifying Bare-Metal Device Firmware Update Security of Appified IoT Systems
Gadient et al. Security in Android applications