onehouwong / Firmware-Analysis-PapersLinks
Recent security papers on firmware analysis
☆77Updated 4 years ago
Alternatives and similar repositories for Firmware-Analysis-Papers
Users that are interested in Firmware-Analysis-Papers are comparing it to the libraries listed below
Sorting:
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆141Updated 2 years ago
- Repository for monolithic firmware blobs☆87Updated 3 years ago
- A Universal MCU Firmware Emulator for Dynamic Analysis without Any Hardware Dependence.☆143Updated 2 years ago
- DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis☆64Updated 2 years ago
- Real firmware fuzz-tested in P2IM paper☆24Updated 5 years ago
- Automated IoT firmware fuzzing framework.☆83Updated 6 years ago
- ☆53Updated 6 months ago
- ☆163Updated 4 years ago
- ☆69Updated last year
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆47Updated 2 years ago
- ☆18Updated last year
- a blackbox network fuzzer for IoT devices☆56Updated last year
- Code of ISSTA'22: PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation☆60Updated last year
- ☆68Updated 7 months ago
- A Framework for fuzzing USB Drivers by Device Emulation☆127Updated 4 years ago
- This repository contains the code for a fuzzing prototype for the OP-TEE system call interface using AFL.☆141Updated 4 years ago
- ☆47Updated 3 years ago
- ☆57Updated last year
- angr's exploration technique to perform taint analysis☆65Updated 5 years ago
- Linux Kernel Fuzzer Corpus☆154Updated this week
- USENIX 2021 - Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types☆206Updated 4 years ago
- ☆27Updated 4 years ago
- Source code of HAL-fuzz☆155Updated 4 years ago
- ☆68Updated 6 years ago
- Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation☆160Updated 3 years ago
- Facilitating Non-Intrusive In-Vivo Firmware Testing with Stateless Instrumentation☆17Updated 2 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆92Updated 3 years ago
- ☆37Updated 3 years ago
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆86Updated last year
- A de-socketing tool that is 10x faster than desock (Preeny) in fuzzing network protocols☆93Updated 3 years ago