DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Dongkwan | ko |
dc.contributor.author | Kim, Eunsoo | ko |
dc.contributor.author | Kim, Mingeun | ko |
dc.contributor.author | Jang, Yeongjin | ko |
dc.contributor.author | Kim, Yongdae | ko |
dc.date.accessioned | 2021-11-17T06:41:45Z | - |
dc.date.available | 2021-11-17T06:41:45Z | - |
dc.date.created | 2021-11-16 | - |
dc.date.created | 2021-11-16 | - |
dc.date.created | 2021-11-16 | - |
dc.date.issued | 2021-11 | - |
dc.identifier.citation | IEEE SECURITY & PRIVACY, v.19, no.6, pp.26 - 35 | - |
dc.identifier.issn | 1540-7993 | - |
dc.identifier.uri | http://hdl.handle.net/10203/289201 | - |
dc.description.abstract | To evaluate Internet of Things device security, researchers have attempted to emulate and dynamically analyze firmware. However, this approach cannot deal with complex hardware/environmental diversities. We show that heuristic workarounds can enable firmware emulation and facilitate the discovery of vulnerabilities. | - |
dc.language | English | - |
dc.publisher | IEEE COMPUTER SOC | - |
dc.title | Enabling the Large-Scale Emulation of Internet of Things Firmware With Heuristic Workarounds | - |
dc.type | Article | - |
dc.identifier.wosid | 000712563900005 | - |
dc.identifier.scopusid | 2-s2.0-85105850466 | - |
dc.type.rims | ART | - |
dc.citation.volume | 19 | - |
dc.citation.issue | 6 | - |
dc.citation.beginningpage | 26 | - |
dc.citation.endingpage | 35 | - |
dc.citation.publicationname | IEEE SECURITY & PRIVACY | - |
dc.identifier.doi | 10.1109/MSEC.2021.3076226 | - |
dc.embargo.liftdate | 9999-12-31 | - |
dc.embargo.terms | 9999-12-31 | - |
dc.contributor.localauthor | Kim, Yongdae | - |
dc.contributor.nonIdAuthor | Kim, Mingeun | - |
dc.contributor.nonIdAuthor | Jang, Yeongjin | - |
dc.description.isOpenAccess | N | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | Microprogramming | - |
dc.subject.keywordAuthor | Internet of Things | - |
dc.subject.keywordAuthor | Computer security | - |
dc.subject.keywordAuthor | Software testing | - |
dc.subject.keywordAuthor | Performance evaluation | - |
dc.subject.keywordAuthor | Wireless communication | - |
dc.subject.keywordAuthor | Complexity theory | - |
dc.subject.keywordAuthor | Software engineering | - |
dc.subject.keywordAuthor | Heuristic algorithms | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.