Search
Now showing items 1-3 of 3
One Size Does Not Fit All: Security Hardening of MIPS Embedded Systems via Static Binary Debloating for Shared Libraries
(ACM, 2022-02-22)
Embedded systems have become prominent targets for cyberattacks. To exploit firmware’s memory corruption vulnerabilities, cybercriminals harvest reusable code gadgets from the large shared library codebase (e.g., uClibc). ...
Z-Fuzzer: Device-agnostic Fuzzing of Zigbee Protocol Implementation
(ACM, 2021-07-02)
With the proliferation of the Internet of Things (IoT) devices, Zigbee
is widely adopted as a resource-efficient wireless protocol. Recently,
severe vulnerabilities in Zigbee protocol implementations have
compromised ...
Security Analysis of Zigbee Protocol Implementation via Device-agnostic Fuzzing
(ACM, 2023-03)
Zigbee is widely adopted as a resource-efficient wireless protocol in the IoT network. IoT devices from manufacturers have
recently been affected due to major vulnerabilities in Zigbee protocol implementations. Security ...