ANATOMY_OF_A_FIRMWARE_ATTACK
A_Large-Scale_Analysis_of_the_Security_of_Embedded_Firmwares
A_Survey_of_Security_Vulnerability_Analysis_Discovery_Detection_and_Mitigation_on_IoT_Devices
Advanced_SOHO_Router_Exploitation
Beginners_Guide_on_How_to_Start_Exploring_IoT_Security
Bushwhacking_your_way_around_a_bootloader
Cameras_Thermostats_and_Home_Automation_Controllers
CryptoREX_Large-scale_Analysis_of_Cryptographic_Misuse_in_IoT_Devices
DIY_ARM_Debugger_for_Wi-Fi_Chips
DTaint_Detecting_the_Taint-Style_Vulnerability_in_Embedded_Device_Firmware
Embedded_Research_Automation
Exploit_Almost_All_Xiaomi_Routers_Using_Logical_Bugs
FIE_on_Firmware_Finding_Vulnerabilities_in_Embedded_Systems_Using_Symbolic_Execution
FIRM-AFL_High-Throughput_Greybox_Fuzzing_of_IoT_Firmware_via_Augmented_Process_Emulation
FIRMCORN_Vulnerability-Oriented_Fuzzing_of_IoT_Firmware_via_Optimized_Virtual_Execution
FirmAE_Towards_Large-Scale_Emulation_of_IoT_Firmware_for_Dynamic_Analysis
Firmalice-Automatic_Detection_of_Authentication_Bypass_Vulnerabilitiesin_Binary_Firmware
IoTFuzzer_Discovering_Memory_Corruptions_in_IoT_Through_App-based_Fuzzing
IoT_Behavioral_Monitoring_via_Network_Traffic_Analysis
IoT_Goes_Nuclear_Creating_a_Zigbee_Chain_Reaction
On_the_State_of_Internet_of_Things_Security_Vulnerabilities_Attacks_and_Recent_Countermeasures
Program_Analysis_of_Commodity_IoT_Applications_for_Security_and_Privacy_Challenges_and_Opportunities
Qiling_Framework_Introduction
Reversing_FreeRTOS_on_embedded_devices
Reversing_IoT_Xiaomi_ecosystem
RECON-BRX-2018-Reversing-IoT-Xiaomi-ecosystem.pdf
Scalable_Graph-based_Bug_Search_for_Firmware_Images
Sensitive_Information_Tracking_in_Commodity_IoT
Sneaking_Past_Edge-Based_Access_Control_Devices
Sok_Security_evaluation_of_home-based_iot_deployments
Subverting_your_server_through_its_BMC_the_HPE_iLO4_case
The_Art_Craft_of_writing_ARM_shellcode
Toward_Automated_Firmware_Analysis_in_the_IoT_Era
Toward_the_Analysis_of_Embedded_Firmware_through_Automated_Re-hosting
Towards_Automated_Dynamic_Analysis_for_Linux-based_Embedded_Firmware
Turning_remotes_into_listening_devices
Vulnerabilities_in_first-generation_RFID-enabled_credit_cards
What_You_Corrupt_Is_Not_What_You_Crash_Challenges_in_Fuzzing_Embedded_Devices
Folders and files Name Name Last commit message
Last commit date
parent directory
View all files
You can’t perform that action at this time.