Search
Now showing items 1-2 of 2
Security Analysis of Zigbee Protocol Implementation via Device-agnostic Fuzzing
(ACM, 2023-03)
Zigbee is widely adopted as a resource-efficient wireless protocol in the IoT network. IoT devices from manufacturers have
recently been affected due to major vulnerabilities in Zigbee protocol implementations. Security ...
INVESTIGATING THE EFFECT OF PEEPHOLE OPTIMIZATIONS ON BINARY CODE DIFFERENCES
(2023-09-01)
**Please note that the full text is embargoed until 8/1/2025** ABSTRACT: Binary diffing is a technique used to compare and identify differences or similarities in executable files without access to source code. The potential ...