onehouwong / Firmware-Analysis-PapersView external linksLinks
Recent security papers on firmware analysis
☆78Aug 30, 2021Updated 4 years ago
Alternatives and similar repositories for Firmware-Analysis-Papers
Users that are interested in Firmware-Analysis-Papers are comparing it to the libraries listed below
Sorting:
- DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis☆64Oct 14, 2023Updated 2 years ago
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆141Oct 14, 2023Updated 2 years ago
- A Universal MCU Firmware Emulator for Dynamic Analysis without Any Hardware Dependence.☆145Nov 20, 2023Updated 2 years ago
- Real firmware fuzz-tested in P2IM paper☆24Dec 11, 2020Updated 5 years ago
- ☆71Oct 25, 2024Updated last year
- ☆27Mar 16, 2023Updated 2 years ago
- Tool to trace ARM Cortex-M assembly instructions and extract arguments to configuration APIs (supervisor calls or function calls).☆31Jan 17, 2022Updated 4 years ago
- Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware☆421Sep 18, 2021Updated 4 years ago
- Repository for monolithic firmware blobs☆88Mar 10, 2022Updated 3 years ago
- ☆14Dec 10, 2021Updated 4 years ago
- μSBS: Static Binary Sanitization of Bare-metal Embedded Devices☆33Jul 14, 2022Updated 3 years ago
- ☆31May 28, 2023Updated 2 years ago
- ☆34Apr 7, 2022Updated 3 years ago
- ☆27Jul 31, 2021Updated 4 years ago
- A prototype of Shared-keywords aware Taint Checking, a novel static analysis approach that tracks the data flow of the user input between…☆339Dec 12, 2024Updated last year
- ☆164Oct 6, 2021Updated 4 years ago
- Shared Library to intercept nvram get/set/match calls for emulating libnvram.so used by many IoT firmware software.☆69Aug 10, 2021Updated 4 years ago
- An automated static taint analysis tool for the Lua web framework.☆24Sep 27, 2024Updated last year
- A list of resources (papers, books, talks, frameworks, tools) for understanding fuzzing for IoT/embedded devices.☆51Jul 5, 2022Updated 3 years ago
- Fuzzware's main repository. Start here to install.☆363Dec 18, 2025Updated last month
- Source code of HAL-fuzz☆157Feb 4, 2021Updated 5 years ago
- Unit test firmware evaluated in P2IM paper☆11Jul 2, 2021Updated 4 years ago
- Artifacts for CO3: Concolic Co-execution for Firmware☆13Dec 30, 2024Updated last year
- ☆11Jul 4, 2023Updated 2 years ago
- SymQEMU: Compilation-based symbolic execution for binaries☆370May 5, 2025Updated 9 months ago
- Same-Architecture Firmware Rehosting and Fuzzing☆130Dec 19, 2024Updated last year
- ☆53Jun 23, 2025Updated 7 months ago
- Optimizing Directed Fuzzing via Target-tailored Program State Restriction☆31May 16, 2023Updated 2 years ago
- ☆37May 11, 2022Updated 3 years ago
- CFG explorer for binaries☆84Oct 29, 2024Updated last year
- ☆58Oct 15, 2020Updated 5 years ago
- ☆82Sep 3, 2021Updated 4 years ago
- Using automata learning to mine models used for fuzzing of statefull systems☆24Apr 13, 2021Updated 4 years ago
- High-Efficiency eXpanded Coverage for Improved Testing of Executables☆25Jul 7, 2022Updated 3 years ago
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆84Mar 16, 2023Updated 2 years ago
- FIRM-AFL is the first high-throughput greybox fuzzer for IoT firmware.☆457Mar 22, 2024Updated last year
- Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read☆1,353Feb 21, 2025Updated 11 months ago
- Files used for reproducing Fuzzware's experiments☆61Apr 11, 2023Updated 2 years ago