
Distributed System Security Symposium, NDSS 2016,
San Diego, California, USA, February 21-24, 2016.
The Internet Society.
Costin, A., Zaddach, J., Francillon, A., and Balzarotti, D.
(2014). A large-scale analysis of the security of em-
bedded firmwares. In Fu, K. and Jung, J., editors,
Proceedings of the 23rd USENIX Security Symposium,
San Diego, CA, USA, August 20-22, 2014, pages 95–
110. USENIX Association.
Costin, A., Zarras, A., and Francillon, A. (2016). Au-
tomated dynamic firmware analysis at scale: a case
study on embedded web interfaces. In Proceedings of
the 11th ACM on Asia Conference on Computer and
Communications Security, pages 437–448.
David, Y., Partush, N., and Yahav, E. (2018). Firmup:
Precise static detection of common vulnerabilities in
firmware. ACM SIGPLAN Notices, 53(2):392–404.
European Cyber Security Organisation - ECSO
(2022). Technical Paper on Internet of
Things (IoT). https://ecs-org.eu/?publications=
technical-paper-on-internet-of-things-iot. Accessed:
2024-04-27.
Fraunhofer FKIE-CAD (2017). FACT core: Firmware
Analysis and Comparison Tool. https://github.com/
fkie-cad/FACT core. Accessed: 2024-04-24.
Galloro, N., Polino, M., Carminati, M., Continella, A., and
Zanero, S. (2022). A systematical and longitudinal
study of evasive behaviors in windows malware. Com-
put. Secur., 113:102550.
Hu, Y., Zhang, Y., Li, J., and Gu, D. (2017). Binary
code clone detection across architectures and compil-
ing configurations. In Proceedings of the 25th Interna-
tional Conference on Program Comprehension, ICPC
2017, pages 88–98. IEEE Computer Society.
Jung, J., Hu, H., Solodukhin, D., Pagan, D., Lee, K. H.,
and Kim, T. (2019). Fuzzification: Anti-Fuzzing
techniques. In 28th USENIX Security Symposium.
USENIX Association.
Nadir, I., Mahmood, H., and Shah, G. A. (2022). A taxon-
omy of iot firmware security and principal firmware
analysis techniques. Int. J. Crit. Infrastructure Prot.,
38:100552.
Neshenko, N., Bou-Harb, E., Crichigno, J., Kaddoum, G.,
and Ghani, N. (2019). Demystifying iot security: An
exhaustive survey on iot vulnerabilities and a first em-
pirical look on internet-scale iot exploitations. IEEE
Communications Surveys & Tutorials, 21(3):2702–
2733.
Nicolao, P. D., Pogliani, M., Polino, M., Carminati, M.,
Quarta, D., and Zanero, S. (2018). ELISA: eliciting
ISA of raw binaries for fine-grained code and data sep-
aration. In Detection of Intrusions and Malware, and
Vulnerability Assessment - 15th International Confer-
ence, DIMVA 2018, volume 10885 of Lecture Notes in
Computer Science, pages 351–371. Springer.
Palavicini Jr., G., Bryan, J., Sheets, E., Kline, M., and
Miguel, J. S. (2017). Towards firmware analysis of
industrial internet of things (iiot) - applying symbolic
analysis to iiot firmware vetting. In Proceedings of the
2nd International Conference on Internet of Things,
Big Data and Security, IoTBDS 2017, pages 470–477.
SciTePress.
Red Balloon Security (2022). Open Firmware Re-
verse Analysis Konsole. https://github.com/
redballoonsecurity/ofrak. Accessed: 2024-04-27.
Redini, N., Machiry, A., Wang, R., Spensky, C., Continella,
A., Shoshitaishvili, Y., Kruegel, C., and Vigna, G.
(2020). Karonte: Detecting insecure multi-binary in-
teractions in embedded firmware. In 2020 IEEE Sym-
posium on Security and Privacy, SP 2020, San Fran-
cisco, CA, USA, May 18-21, 2020, pages 1544–1561.
IEEE.
Remigio, R., Bertani, A., Polino, M., Carminati, M., and
Zanero, S. (2023). The good, the bad, and the binary:
An lstm-based method for section boundary detection
in firmware analysis. In 18th Int. Workshop on Se-
curity, IWSEC 2023, Lecture Notes in Computer Sci-
ence. Springer.
Schwartz, E. J., Avgerinos, T., and Brumley, D. (2010).
All you ever wanted to know about dynamic taint
analysis and forward symbolic execution (but might
have been afraid to ask). In 31st IEEE Symposium
on Security and Privacy, SP 2010, 16-19 May 2010,
Berleley/Oakland, California, USA, pages 317–331.
IEEE Computer Society.
Secure Firmware (2022). EMBA - The firmware secu-
rity analyzer. https://github.com/e-m-b-a/emba. Ac-
cessed: 2024-04-27.
Shoshitaishvili, Y., Wang, R., Salls, C., Stephens, N.,
Polino, M., Dutcher, A., Grosen, J., Feng, S., Hauser,
C., Kr
¨
ugel, C., and Vigna, G. (2016). SOK: (state of)
the art of war: Offensive techniques in binary analy-
sis. In IEEE Symposium on Security and Privacy, SP
2016, San Jose, CA, USA, May 22-26, 2016, pages
138–157. IEEE Computer Society.
Thomas, S. L., Garcia, F. D., and Chothia, T. (2017).
Humidify: A tool for hidden functionality detection
in firmware. In Detection of Intrusions and Mal-
ware, and Vulnerability Assessment - 14th Interna-
tional Conference, DIMVA 2017, volume 10327 of
Lecture Notes in Computer Science, pages 279–300.
Springer.
Yu, R., Nin, F. D., Zhang, Y., Huang, S., Kaliyar, P., Za-
kto, S., Conti, M., Portokalidis, G., and Xu, J. (2022).
Building embedded systems like it’s 1996. In 29th An-
nual Network and Distributed System Security Sympo-
sium, NDSS 2022, San Diego, California, USA, April
24-28, 2022. The Internet Society.
Zaddach, J., Bruno, L., Francillon, A., and Balzarotti, D.
(2014). AVATAR: A framework to support dynamic
security analysis of embedded systems’ firmwares. In
21st Annual Network and Distributed System Security
Symposium, NDSS 2014, San Diego, California, USA,
February 23-26, 2014. The Internet Society.
Zhu, L., Fu, X., Yao, Y., Zhang, Y., and Wang, H. (2019).
Fiot: Detecting the memory corruption in lightweight
iot device firmware. In 18th IEEE International Con-
ference On Trust, Security And Privacy In Computing
And Communications / 13th IEEE International Con-
ference On Big Data Science And Engineering, Trust-
Com/BigDataSE 2019, pages 248–255. IEEE.
Do You Trust Your Device? Open Challenges in IoT Security Analysis
575