- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources2
- Resource Type
-
20000
- Availability
-
20
- Author / Contributor
- Filter by Author / Creator
-
-
Muench, Marius (2)
-
Ballo, Tiemoko (1)
-
Balzarotti, Davide (1)
-
Bulekov, Alexander (1)
-
Butler, Kevin (1)
-
Dolan-Gavitt, Brendan (1)
-
Egele, Manuel (1)
-
Fasano, Andrew (1)
-
Francillon, Aurelien (1)
-
Gregory, Nick (1)
-
Hernandez, Grant (1)
-
Leek, Tim (1)
-
Lu, Long (1)
-
Maier, Dominik (1)
-
Milburn, Alyssa (1)
-
Park, Shinjo (1)
-
Robertson, William (1)
-
Scharnowski, Tobias (1)
-
Traynor, Patrick (1)
-
Tucker, Tyler (1)
-
- Filter by Editor
-
-
null (1)
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
2022 USENIX Annual Technical Conference (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Fasano, Andrew ; Ballo, Tiemoko ; Muench, Marius ; Leek, Tim ; Bulekov, Alexander ; Dolan-Gavitt, Brendan ; Egele, Manuel ; Francillon, Aurelien ; Lu, Long ; Gregory, Nick ; et al ( , ACM ASIA Conference on Computer and Communications Security (ASIACCS))null (Ed.)Closely monitoring the behavior of a software system during its execution enables developers and analysts to observe, and ultimately understand, how it works. This kind of dynamic analysis can be instrumental to reverse engineering, vulnerability discovery, exploit development, and debugging. While these analyses are typically well-supported for homogeneous desktop platforms (e.g., x86 desktop PCs), they can rarely be applied in the heterogeneous world of embedded systems. One approach to enable dynamic analyses of embedded systems is to move software stacks from physical systems into virtual environments that sufficiently model hardware behavior. This process which we call “rehosting” poses a significant research challenge with major implications for security analyses. Although rehosting has traditionally been an unscientific and ad-hoc endeavor undertaken by domain experts with varying time and resources at their disposal, researchers are beginning to address rehosting challenges systematically and in earnest. In this paper, we establish that emulation is insufficient to conduct large-scale dynamic analysis of real-world hardware systems and present rehosting as a firmware-centric alternative. Furthermore, we taxonomize preliminary rehost- ing efforts, identify the fundamental components of the rehosting process, and propose directions for future research.more » « less