Embedded fuzzing: a review of challenges, tools, and solutions

被引:0
作者
Max Eisele
Marcello Maugeri
Rachna Shriwas
Christopher Huth
Giampaolo Bella
机构
[1] Robert Bosch GmbH,Safety, Security and Privacy
[2] Università degli Studi di Catania,Dept. of Math and Computer Science
[3] Robert Bosch GmbH,RBEI
来源
Cybersecurity | / 5卷
关键词
Embedded systems; Dynamic analysis; Vulnerability mining; Embedded security; Software security;
D O I
暂无
中图分类号
学科分类号
摘要
Fuzzing has become one of the best-established methods to uncover software bugs. Meanwhile, the market of embedded systems, which binds the software execution tightly to the very hardware architecture, has grown at a steady pace, and that pace is anticipated to become yet more sustained in the near future. Embedded systems also benefit from fuzzing, but the innumerable existing architectures and hardware peripherals complicate the development of general and usable approaches, hence a plethora of tools have recently appeared. Here comes a stringent need for a systematic review in the area of fuzzing approaches for embedded systems, which we term “embedded fuzzing” for brevity. The inclusion criteria chosen in this article are semi-objective in their coverage of the most relevant publication venues as well as of our personal judgement. The review rests on a formal definition we develop to represent the realm of embedded fuzzing. It continues by discussing the approaches that satisfy the inclusion criteria, then defines the relevant elements of comparison and groups the approaches according to how the execution environment is served to the system under test. The resulting review produces a table with 42 entries, which in turn supports discussion suggesting vast room for future research due to the limitations noted.
引用
收藏
相关论文
共 11 条
[1]  
Böhme M(2018)Stads: Software testing as species discovery ACM Trans Softw Eng Methodol (TOSEM) 27 1-52
[2]  
Gui Z(2020)Firmcorn: Vulnerability-oriented fuzzing of iot firmware via optimized virtual execution IEEE Access 8 29826-29841
[3]  
Shu H(1976)Symbolic execution and program testing Commun ACM 19 385-394
[4]  
Kang F(2021)Challenges in firmware re-hosting, emulation, and analysis ACM Comput Surv (CSUR) 54 1-36
[5]  
Xiong X(undefined)undefined undefined undefined undefined-undefined
[6]  
King JC(undefined)undefined undefined undefined undefined-undefined
[7]  
Wright C(undefined)undefined undefined undefined undefined-undefined
[8]  
Moeglein WA(undefined)undefined undefined undefined undefined-undefined
[9]  
Bagchi S(undefined)undefined undefined undefined undefined-undefined
[10]  
Kulkarni M(undefined)undefined undefined undefined undefined-undefined