Enabling the Large-Scale Emulation of Internet of Things Firmware With Heuristic Workarounds

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 230
  • Download : 48
DC FieldValueLanguage
dc.contributor.authorKim, Dongkwanko
dc.contributor.authorKim, Eunsooko
dc.contributor.authorKim, Mingeunko
dc.contributor.authorJang, Yeongjinko
dc.contributor.authorKim, Yongdaeko
dc.date.accessioned2021-11-17T06:41:45Z-
dc.date.available2021-11-17T06:41:45Z-
dc.date.created2021-11-16-
dc.date.created2021-11-16-
dc.date.created2021-11-16-
dc.date.issued2021-11-
dc.identifier.citationIEEE SECURITY & PRIVACY, v.19, no.6, pp.26 - 35-
dc.identifier.issn1540-7993-
dc.identifier.urihttp://hdl.handle.net/10203/289201-
dc.description.abstractTo evaluate Internet of Things device security, researchers have attempted to emulate and dynamically analyze firmware. However, this approach cannot deal with complex hardware/environmental diversities. We show that heuristic workarounds can enable firmware emulation and facilitate the discovery of vulnerabilities.-
dc.languageEnglish-
dc.publisherIEEE COMPUTER SOC-
dc.titleEnabling the Large-Scale Emulation of Internet of Things Firmware With Heuristic Workarounds-
dc.typeArticle-
dc.identifier.wosid000712563900005-
dc.identifier.scopusid2-s2.0-85105850466-
dc.type.rimsART-
dc.citation.volume19-
dc.citation.issue6-
dc.citation.beginningpage26-
dc.citation.endingpage35-
dc.citation.publicationnameIEEE SECURITY & PRIVACY-
dc.identifier.doi10.1109/MSEC.2021.3076226-
dc.embargo.liftdate9999-12-31-
dc.embargo.terms9999-12-31-
dc.contributor.localauthorKim, Yongdae-
dc.contributor.nonIdAuthorKim, Mingeun-
dc.contributor.nonIdAuthorJang, Yeongjin-
dc.description.isOpenAccessN-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorMicroprogramming-
dc.subject.keywordAuthorInternet of Things-
dc.subject.keywordAuthorComputer security-
dc.subject.keywordAuthorSoftware testing-
dc.subject.keywordAuthorPerformance evaluation-
dc.subject.keywordAuthorWireless communication-
dc.subject.keywordAuthorComplexity theory-
dc.subject.keywordAuthorSoftware engineering-
dc.subject.keywordAuthorHeuristic algorithms-
Appears in Collection
EE-Journal Papers(저널논문)
Files in This Item

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0