Vehicle Firmware Emulation Fuzzing - Recent Paper
Eveneko Blogger


All Papers(Classification according to Subject)


  • Detecting Vulnerability on IoT Device Firmware: A Survey (2022)

  • Fuzzing: A Survey for Roadmap (2022)

  • Challenges in Firmware Re-Hosting, Emulation, and Analysis (2021)

  • A Review of Fuzzing Techniques (2021)

  • IoT Bugs and Development Challenges (2021)

  • 嵌入式设备固件安全分析技术研究 (2021)

  • Firmware Fuzzing: The State of the Art (2020)

  • Fuzzing: State of the Art (2018)

  • The Art, Science, and Engineering of Fuzzing: A Survey (2018)

General Fuzzing

  • LibAFL: A Framework to Build Modular and Reusable Fuzzers (2022)

Firmware Fuzzing

  • Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing (2022)

  • FIRM-COV: High-Coverage Greybox Fuzzing for IoT Firmware via Optimized Process Emulation (2021)

  • DIANE: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices (2021)

  • FIRMNANO: Toward IoT Firmware Fuzzing Through Augmented Virtual Execution (2020)

  • EM-Fuzz: Augmented Firmware Fuzzing via Memory Checking (2020)

  • Fw-fuzz: A code coverage-guided fuzzing framework for network protocols on firmware (2020)

  • FIRMCORN: Vulnerability-Oriented Fuzzing of IoT Firmware via Optimized Virtual Execution (2020)

  • FirmFuzz: Automated IoT Firmware Introspection and Analysis (2019)

  • What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices (2018)

Real Device

  • A Runtime Verification Tool for Detecting Concurrency Bugs in FreeRTOS Embedded Software (2018)

  • IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing (2018)

  • RPFuzzer: A Framework for Discovering Router Protocols Vulnerabilities Based on Fuzzing (2013)


  • FirmAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis (2020)

  • FIRM-AFL: high-throughput greybox fuzzing of iot firmware via augmented process emulation (2019)

  • Towards Automated Dynamic Analysis for Linux-based Embedded Firmware (2016)


  • Avatar2: A Multi-target Orchestration Platform (2018)

  • SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems (2015)

  • AVATAR: A framework to support dynamic security analysis of embedded systems’ firmwares (2014)


  • Automatic Firmware Emulation through Invalidity-guided Knowledge Inference (2021)

  • FirmGuide: Boosting the Capability of Rehosting Embedded Linux Kernels through Model-Guided Kernel Execution (2021)

  • HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation (2020)

  • Device-agnostic Firmware Execution is Possible: A Concolic Execution Approach for Peripheral Emulation (2020)

  • DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis (2020)

  • P2IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling(2020)

  • Toward the Analysis of Embedded Firmware through Automated Re-hosting (2019)

Static Analysis

  • Karonte: Detecting Insecure Multi-binary Interactions in Embedded Firmware (2020)

  • Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware (2015)

General Symoblic Execution

  • SymQEMU:Compilation-based symbolic execution for binaries (2021)

  • Systematic Comparison of Symbolic Execution Systems: Intermediate Representation and its Generation (2019)

  • A Survey of Symbolic Execution Techniques (2016)

  • (State of) The Art of War: Offensive Techniques in Binary Analysis (2016)


  • Cyber–Physical Security of Powertrain Systems in Modern Electric Vehicles: Vulnerabilities, Challenges, and Future Visions (2021)

  • A Brief Survey on Autonomous Vehicle Possible Attacks,Exploits and Vulnerabilities (2021)

  • Research on Detection and Evaluation Technology of Cybersecurity in Intelligent and Connected Vehicle (2019)



  • Post title:Vehicle Firmware Emulation Fuzzing - Recent Paper
  • Post author:Eveneko
  • Create time:2022-07-10 17:27:17
  • Post link:
  • Copyright Notice:All articles in this blog are licensed under BY-NC-SA unless stating additionally.