2022 IEEE Symposium on Security and Privacy (SP) 2022
DOI: 10.1109/sp46214.2022.9833610
|View full text |Cite
|
Sign up to set email alerts
|

HEAPSTER: Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 25 publications
0
3
0
Order By: Relevance
“…Since this framework is a modularization of existing tools, it cannot be applied to drone firmware for which there is no publicly available tool. In addition, a firmware analysis tool called HEAPSTER, published by Fabio Gritti and others in IEEE S&P in 2022, has the ability to automatically identify the heap area of the firmware and detect heap vulnerabilities using it [17].…”
Section: Iot Firmware Vulnerability Analysismentioning
confidence: 99%
“…Since this framework is a modularization of existing tools, it cannot be applied to drone firmware for which there is no publicly available tool. In addition, a firmware analysis tool called HEAPSTER, published by Fabio Gritti and others in IEEE S&P in 2022, has the ability to automatically identify the heap area of the firmware and detect heap vulnerabilities using it [17].…”
Section: Iot Firmware Vulnerability Analysismentioning
confidence: 99%
“…However, these interactions come at the cost of increased complexity and a much wider attack surface. Zhou et al [63] estimate that between April 2018 and April 2022, DeFi protocols suffered from attacks that resulted in the loss of more than 3 billion dollars, making smart contract vulnerability hunting a hot topic in both industry and academia [8], [9], [15], [30], [35], [36], [38], [40], [43], [47], [50].…”
Section: Introductionmentioning
confidence: 99%
“…The secure operation of these systems therefore heavily relies on the security of firmware running on the MCU-based devices. In recent years, we have witnessed a significant number of vulnerability exposures that target MCU-based systems [45], [53], [46], [22], [36], [37], [71], resulting in widespread real-world exploitation [30], [40], [48], [84]. This highlights the critical need to develop effective and efficient firmware testing tools.…”
Section: Introductionmentioning
confidence: 99%