Matches in SemOpenAlex for { <https://semopenalex.org/work/W3132305133> ?p ?o ?g. }
Showing items 1 to 61 of
61
with 100 items per page.
- W3132305133 abstract "Author(s): Redini, Nilo | Advisor(s): Vigna, Giovanni; Kruegel, Christopher | Abstract: Internet of Things (IoT) devices have rooted themselves in the everyday life of billions of people. While they automate and simplify many aspects of the users’ lives, the widespread usage of IoT devices constitutes a security concern for our modern society. Aside from the privacy and safety implications of having a smart door lock that could succumb to an Internet-based attack, or a smoke detector that an assailant could disable by connecting to it from a compromised light bulb, vulnerabilities in these devices have wider implications. Recent large-scale attacks have shown that the sheer number of Internet-connected IoT devices poses a severe threat to the Internet infrastructure. The most prominent example is represented by the Mirai botnet that, in 2016, compromised millions of devices and leveraged them in denial-of-service attacks to disrupt core Internet services and shut down websites.For these reasons, it is of crucial importance to assess the security of IoT devices. Analyzing and securing IoT devices present different and specific challenges than analyzing and securing traditional desktop computers. The main reason is that IoT devices are manufactured by a plethora of different vendors, which often use vendor-specific hardware and software (or firmware) for their products. Given the heterogeneity and widespread usage of IoT devices, we need novel, automated, and scalable solutions able to improve the security of these devices.During my Ph.D., I approached the problem of securing IoT devices from different angles and using different strategies, which I present in detail in this dissertation. First, I introduce the IoT landscape, with particular attention to the peculiarities that characterize embedded firmware. Then, I present in detail my work that advances the state of the art of firmware security. In particular, I present (i) BootStomp, a novel tool to find bugs in bootloaders for embedded devices, (ii) Karonte, a novel static analysis approach to track data flows across the different components of a firmware sample to precisely uncover security vulnerabilities, (iii) Bintrimmer, a tool that relies on a novel abstract domain (called Signedness-Agnostic Strided Interval) to perform code debloating on binaries, thus decreasing the attack surface that could be used by an attacker to harm end-users, and, finally, (iv) DiAne, a novel approach to fuzz IoT devices that leverages the logic of the device’s companion app (i.e., the application commonly used to interact with IoT devices). I evaluate the performance of the proposed approaches and show that the developed tools are effective in improving the security of firmware for IoT devices." @default.
- W3132305133 created "2021-03-01" @default.
- W3132305133 creator A5035847553 @default.
- W3132305133 date "2020-01-01" @default.
- W3132305133 modified "2023-10-04" @default.
- W3132305133 title "Analyzing and Securing Firmware for IoT Devices" @default.
- W3132305133 hasPublicationYear "2020" @default.
- W3132305133 type Work @default.
- W3132305133 sameAs 3132305133 @default.
- W3132305133 citedByCount "0" @default.
- W3132305133 crossrefType "journal-article" @default.
- W3132305133 hasAuthorship W3132305133A5035847553 @default.
- W3132305133 hasConcept C108827166 @default.
- W3132305133 hasConcept C110875604 @default.
- W3132305133 hasConcept C111919701 @default.
- W3132305133 hasConcept C136764020 @default.
- W3132305133 hasConcept C22735295 @default.
- W3132305133 hasConcept C38652104 @default.
- W3132305133 hasConcept C38822068 @default.
- W3132305133 hasConcept C41008148 @default.
- W3132305133 hasConcept C541664917 @default.
- W3132305133 hasConcept C67212190 @default.
- W3132305133 hasConcept C81860439 @default.
- W3132305133 hasConceptScore W3132305133C108827166 @default.
- W3132305133 hasConceptScore W3132305133C110875604 @default.
- W3132305133 hasConceptScore W3132305133C111919701 @default.
- W3132305133 hasConceptScore W3132305133C136764020 @default.
- W3132305133 hasConceptScore W3132305133C22735295 @default.
- W3132305133 hasConceptScore W3132305133C38652104 @default.
- W3132305133 hasConceptScore W3132305133C38822068 @default.
- W3132305133 hasConceptScore W3132305133C41008148 @default.
- W3132305133 hasConceptScore W3132305133C541664917 @default.
- W3132305133 hasConceptScore W3132305133C67212190 @default.
- W3132305133 hasConceptScore W3132305133C81860439 @default.
- W3132305133 hasLocation W31323051331 @default.
- W3132305133 hasOpenAccess W3132305133 @default.
- W3132305133 hasPrimaryLocation W31323051331 @default.
- W3132305133 hasRelatedWork W2562262282 @default.
- W3132305133 hasRelatedWork W2891585364 @default.
- W3132305133 hasRelatedWork W2899168672 @default.
- W3132305133 hasRelatedWork W2900173143 @default.
- W3132305133 hasRelatedWork W2903132754 @default.
- W3132305133 hasRelatedWork W2907131391 @default.
- W3132305133 hasRelatedWork W2907985091 @default.
- W3132305133 hasRelatedWork W2982625477 @default.
- W3132305133 hasRelatedWork W3009479568 @default.
- W3132305133 hasRelatedWork W3036436026 @default.
- W3132305133 hasRelatedWork W3043658489 @default.
- W3132305133 hasRelatedWork W3048623802 @default.
- W3132305133 hasRelatedWork W3093692271 @default.
- W3132305133 hasRelatedWork W3100811863 @default.
- W3132305133 hasRelatedWork W3154869532 @default.
- W3132305133 hasRelatedWork W3155353628 @default.
- W3132305133 hasRelatedWork W3157361081 @default.
- W3132305133 hasRelatedWork W3173923030 @default.
- W3132305133 hasRelatedWork W3176445685 @default.
- W3132305133 hasRelatedWork W3183770138 @default.
- W3132305133 isParatext "false" @default.
- W3132305133 isRetracted "false" @default.
- W3132305133 magId "3132305133" @default.
- W3132305133 workType "article" @default.