Xue et al., 2024 - Google Patents
Update If You Dare: Demystifying Bare-Metal Device Firmware Update Security of Appified IoT SystemsXue et al., 2024
- Document ID
- 1346040151763256608
- Author
- Xue L
- Yan Y
- Tang Q
- Yu L
- Luo X
- Cai Z
- Nie S
- Wu S
- Gu G
- Wang C
- Publication year
- Publication venue
- IEEE Transactions on Dependable and Secure Computing
External Links
Snippet
Due to the economy and low power consumption features, bare-metal IoT devices have been widely used in various areas of our life, and they are usually paired with companion mobile apps to configure them and view their states (aka, appified IoT system). The IoT …
- 229910052751 metal 0 title abstract description 81
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chen et al. | IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing. | |
Rahaman et al. | Cryptoguard: High precision detection of cryptographic vulnerabilities in massive-sized java projects | |
Cheng et al. | DTaint: detecting the taint-style vulnerability in embedded device firmware | |
Lu et al. | Chex: statically vetting android apps for component hijacking vulnerabilities | |
Liu et al. | On manually reverse engineering communication protocols of linux-based iot systems | |
Spreitzenbarth et al. | Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques | |
Neuner et al. | Enter sandbox: Android sandbox comparison | |
Zhang et al. | {CryptoREX}: Large-scale analysis of cryptographic misuse in {IoT} devices | |
Ali-Gombe et al. | Toward a more dependable hybrid analysis of android malware using aspect-oriented programming | |
Yang et al. | Automated generation of event-oriented exploits in android hybrid apps | |
Botacin et al. | Antiviruses under the microscope: A hands-on perspective | |
Ibrahim et al. | SafetyNOT: on the usage of the SafetyNet attestation API in Android | |
CN108595950A (en) | A kind of safe Enhancement Methods of SGX of combination remote authentication | |
Yang et al. | Vetting Single {Sign-On}{SDK} Implementations via Symbolic Reasoning | |
Yankson et al. | Security assessment for Zenbo robot using Drozer and mobSF frameworks | |
Bakhshi et al. | A Review of IoT Firmware Vulnerabilities and Auditing Techniques | |
He et al. | Toward hybrid static-dynamic detection of vulnerabilities in IoT firmware | |
Liu et al. | Security analysis of vendor customized code in firmware of embedded device | |
Hei et al. | Two vulnerabilities in Android OS kernel | |
CN115048630A (en) | Integrity verification method and device of application program, storage medium and electronic equipment | |
Tang et al. | Ssldetecter: detecting SSL security vulnerabilities of android applications based on a novel automatic traversal method | |
Shwartz et al. | Inner conflict: How smart device components can cause harm | |
Park et al. | A-pot: a comprehensive android analysis platform based on container technology | |
Xue et al. | Update If You Dare: Demystifying Bare-Metal Device Firmware Update Security of Appified IoT Systems | |
Gadient et al. | Security in Android applications |