SoK: Enabling Security Analyses of Embedded Systems via Rehosting
Closely monitoring the behavior of a software system during its execution enables developers and analysts to observe, and ultimately understand, how it works. This kind of dynamic analysis can be instrumental to reverse engineering, vulnerability discovery, exploit development, and debugging. While...
Main Authors: | Fasano, Andrew (Author), Ballo, Tiemoko (Author), Muench, Marius (Author), Leek, Tim (Author), Bulekov, Alexander (Author), Dolan-Gavitt, Brendan (Author), Egele, Manuel (Author), Francillon, Aurelien (Author), Lu, Long (Author), Gregory, Nick (Author), Balzarotti, Davide (Author), Robertson, William (Author) |
---|---|
Other Authors: | Lincoln Laboratory (Contributor) |
Format: | Article |
Language: | English |
Published: |
Association for Computing Machinery (ACM),
2021-04-22T16:39:19Z.
|
Subjects: | |
Online Access: | Get fulltext |
Similar Items
-
SoK: Differential privacies
by: Desfontaines Damien, et al.
Published: (2020-04-01) -
SoK: Anatomy of Data Breaches
by: Saleem Hamza, et al.
Published: (2020-10-01) -
SoK of Used Cryptography in Blockchain
by: Mayank Raikwar, et al.
Published: (2019-01-01) -
SoK: Privacy-Preserving Reputation Systems
by: Gurtler Stan, et al.
Published: (2021-01-01) -
SoK: Efficient Privacy-preserving Clustering
by: Hegde Aditya, et al.
Published: (2021-10-01)