Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

IoT device operating systems

biblio

Visible to the public FIoT: Detecting the Memory Corruption in Lightweight IoT Device Firmware

Submitted by aekwall on Mon, 01/20/2020 - 12:13pm
  • library function identification approach
  • dynamic analysis framework
  • dynamic analysis techniques
  • embedded firmware source code
  • FIoT framework
  • firmware analysis
  • firmware images
  • fuzzing
  • fuzzing test
  • hardware architectures
  • IoT device operating systems
  • IoT industry
  • CFG recovery approach
  • lightweight IoT device firmware images
  • lightweight IoT firmware
  • memory corruption
  • memory corruption vulnerabilities
  • Microprogramming
  • Program slicing
  • security researchers
  • time 170.0 s
  • time 210.0 s
  • time 40.0 s
  • zero trust
  • firmware
  • Scalability
  • Internet of Things
  • security
  • performance evaluation
  • system monitoring
  • Resiliency
  • pubcrawl
  • policy-based governance
  • program testing
  • Libraries
  • static analysis
  • computer network security
  • program diagnostics
  • Human Factors
  • operating systems (computers)
  • program compilers
  • Loading
  • lightweight IoT devices
  • address determination analysis
  • backward slice approach
  • binary code snippets
  • Binary codes
  • binary firmware

Terms of Use  |  ©2023. CPS-VO