Firmware Fuzzing 指北
Eveneko Blogger


  • Avatar: A Framework to Support Dynamic Security Analysis of Embedded Systems’ Firmwares, 2014
  • Towards Automated Dynamic Analysis for Linux-based Embedded Firmware, 2016
  • What you corrupt is not what you crash: Challenges in fuzzing embedded devices, 2018
  • IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing, 2018
  • Fuzzing: State of the Art, 2018
  • FIRM-AFL: high-throughput greybox fuzzing of iot firmware via augmented process emulation, 2019
  • FirmFuzz: Automated IoT Firmware Introspection and Analysis, 2019
  • Firmware Fuzzing: The State of the Art, 2020
  • FIRMNANO: Toward IoT Firmware Fuzzing Through Augmented Virtual Execution, 2020
  • FIRMCORN: Vulnerability-Oriented Fuzzing of IoT Firmware via Optimized Virtual Execution, 2020
  • Fw-fuzz: A code coverage-guided fuzzing framework for network protocols on firmware, 2020
  • EM-Fuzz: Augmented Firmware Fuzzing via Memory Checking, 2020
  • FirmAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis, 2020
  • FIRM-COV: High-Coverage Greybox Fuzzing for IoT Firmware via Optimized Process Emulation, 2021
  • DIANE: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices, 2021
  • A Review of Fuzzing Techniques, 2021
  • Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing, 2022


  • Post title:Firmware Fuzzing 指北
  • Post author:Eveneko
  • Create time:2022-07-10 17:27:17
  • Post link:
  • Copyright Notice:All articles in this blog are licensed under BY-NC-SA unless stating additionally.