Proceedings 2022 Network and Distributed System Security Symposium 2022
DOI: 10.14722/ndss.2022.23136
|View full text |Cite
|
Sign up to set email alerts
|

FirmWire: Transparent Dynamic Analysis for Cellular Baseband Firmware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…Cao et al [6], Johnson et al [29], and Zhou [62], all leverage symbolic execution to learn satisfying values to bypass peripheral checks. Hernandez et al [27] achieve full-system emulation of closed-source Shannon baseband firmware by adding missing architectural and peripheral support in QEMU, they later demonstrate that such an approach can be extended to other basebands [26]. In contrast to the aforementioned approaches, Milburn et al [38] build a custom emulator and peripheral models to rehost an automotive instrument cluster; they use their emulator to aid in reverse-engineering the firmware's UDS commands.…”
Section: Discussion and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Cao et al [6], Johnson et al [29], and Zhou [62], all leverage symbolic execution to learn satisfying values to bypass peripheral checks. Hernandez et al [27] achieve full-system emulation of closed-source Shannon baseband firmware by adding missing architectural and peripheral support in QEMU, they later demonstrate that such an approach can be extended to other basebands [26]. In contrast to the aforementioned approaches, Milburn et al [38] build a custom emulator and peripheral models to rehost an automotive instrument cluster; they use their emulator to aid in reverse-engineering the firmware's UDS commands.…”
Section: Discussion and Related Workmentioning
confidence: 99%
“…Mera et al [37] highlight this difficulty in their evaluationto test their approach on both ARM and MIPS32-based devices, they need to build separate prototypes of their tool for two different forks of QEMU, as neither variant supports both architectures. Hernandez et al [26] note the current impossibility of porting their baseband rehosting framework to work with Qualcomm basebands, due to lack of architecture support in the PANDA [14] QEMU fork.…”
Section: Discussion and Related Workmentioning
confidence: 99%
“…Cao et al [5], Johnson et al [29], and Zhou [61], all leverage symbolic execution to learn satisfying values to bypass peripheral checks. Hernandez et al [27] achieve full-system emulation of closed-source Shannon baseband firmware by adding missing architectural and peripheral support in QEMU, they later demonstrate that such an approach can be extended to other basebands [26]. In contrast to the aforementioned approaches, Milburn et al [38] build a custom emulator and peripheral models to rehost an automotive instrument cluster; they use their emulator to aid in reverse-engineering the firmware's UDS commands.…”
Section: Discussion and Related Workmentioning
confidence: 99%
“…Mera et al [37] highlight this difficulty in their evaluationto test their approach on both ARM and MIPS32-based devices, they need to build separate prototypes of their tool for two different forks of QEMU, as neither variant supports both architectures. Hernandez et al [26] note the current impossibility of porting their baseband rehosting framework to work with Qualcomm basebands, due to lack of architecture support in the PANDA [15] QEMU fork.…”
Section: Discussion and Related Workmentioning
confidence: 99%