Search
Now showing items 1-4 of 4
One Size Does Not Fit All: Security Hardening of MIPS Embedded Systems via Static Binary Debloating for Shared Libraries
(ACM, 2022-02-22)
Embedded systems have become prominent targets for cyberattacks. To exploit firmware’s memory corruption vulnerabilities, cybercriminals harvest reusable code gadgets from the large shared library codebase (e.g., uClibc). ...
Z-Fuzzer: Device-agnostic Fuzzing of Zigbee Protocol Implementation
(ACM, 2021-07-02)
With the proliferation of the Internet of Things (IoT) devices, Zigbee
is widely adopted as a resource-efficient wireless protocol. Recently,
severe vulnerabilities in Zigbee protocol implementations have
compromised ...
Security Analysis of Zigbee Protocol Implementation via Device-agnostic Fuzzing
(ACM, 2023-03)
Zigbee is widely adopted as a resource-efficient wireless protocol in the IoT network. IoT devices from manufacturers have
recently been affected due to major vulnerabilities in Zigbee protocol implementations. Security ...
Fuzz Testing of Zigbee Protocol Implementations
(2023-07-12)
In recent years, we have witnessed the increasing of the Internet of Things (IoT) devices deployed by many areas, such as home automation, healthcare, manufacture, and smart vehicle. Among the numerous IoT wireless standards ...