2019
DOI: 10.1109/access.2019.2961144
|View full text |Cite
|
Sign up to set email alerts
|

A Dynamic Taint Analysis Framework Based on Entity Equipment

Abstract: With the development of the Internet of Things, the security of embedded device has received extensive attention. Taint analysis technology can improve the understanding of the firmware program operating mechanism and improve the effectiveness of security analysis. It is an important method in security analysis. Traditional taint analysis of embedded device firmware requires complex pre-preparation work, setting up a virtual operating environment. Those security analysts have to invest a lot of time and effort… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

1
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 26 publications
1
2
0
Order By: Relevance
“…If we look at Figure 8, we can see that the existence of the variable pqt indicates that the risk factor increases in an IP. Regarding this parame-ter, we confirm that the model works according to the theoretical approach presented in Section (Probability for Query Tags (PQT)), where it is explained that, when Shodan offers this variable, it shows more information about the place where the vulnerability resides, giving the attacker a more extensive knowledge [20,22,51,52].…”
Section: Prioritization Analysissupporting
confidence: 70%
“…If we look at Figure 8, we can see that the existence of the variable pqt indicates that the risk factor increases in an IP. Regarding this parame-ter, we confirm that the model works according to the theoretical approach presented in Section (Probability for Query Tags (PQT)), where it is explained that, when Shodan offers this variable, it shows more information about the place where the vulnerability resides, giving the attacker a more extensive knowledge [20,22,51,52].…”
Section: Prioritization Analysissupporting
confidence: 70%
“…Taint analysis [ 12 ] are technologies to analyze program information flow to detect vulnerabilities or malware. Dynamic taint analysis has been applied to android systems [ 13 , 14 ].…”
Section: Related Workmentioning
confidence: 99%
“…Any other value is considered untainted. A taint policy determines exactly how taint flows as a program executes, what sorts of operations introduce new taint, and what checks are performed on tainted values [41][42][43][44][45][46][47]. Another technique used by IAST tools is symbolic execution.…”
mentioning
confidence: 99%