共 58 条
- [1] Challenges in Designing Exploit Mitigations for Deeply Embedded Systems [J]. 2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2019, : 31 - 46
- [2] Agency N.S, NSA's Research Directorat Ghidra
- [3] [Anonymous], FreeRTOS
- [4] [Anonymous], STM32CubeMX - STM32Cube initialization code generator - STMicroelectronics
- [5] Ba JS, 2022, PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, P3255
- [6] Baktash JA, 2023, Arxiv, DOI [arXiv:2305.03195, 10.48550/arXiv.2305.03195, DOI 10.48550/ARXIV.2305.03195]
- [7] Bellard F, 2005, USENIX Association Proceedings of the FREENIX/Open Source Track, P41
- [8] Directed Greybox Fuzzing [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 2329 - 2344
- [9] Device-agnostic Firmware Execution is Possible: A Concolic Execution Approach for Peripheral Emulation [J]. 36TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2020), 2020, : 746 - 759
- [10] Towards Automated Dynamic Analysis for Linux-based Embedded Firmware [J]. 23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016), 2016,