IOTFUZZER: Discovering Memory Corruption in IoT Through Application-Based Fuzz Testing

IOTFUZZER: Discovering Memory Corruption in IoT Through Application-Based Fuzz Testing

1. Overview The author proposes a novel automated black-box Fuzz testing framework—IOTFUZZER, aimed at monitoring memory corruption vulnerabilities in IoT devices. Main Advantages No need to obtain firmware images of IoT devices. No reverse engineering required. No need to know the specifics of the protocol. Purpose of Work Only Fuzz testing, used to guide subsequent … Read more

Design of a Firmware Bluetooth Protocol Vulnerability Mining Framework Based on Virtualization

Design of a Firmware Bluetooth Protocol Vulnerability Mining Framework Based on Virtualization

Abstract:In recent years, the application of Bluetooth devices has become increasingly widespread. If there are vulnerabilities in Bluetooth devices, it may lead to information leakage, economic losses, and other consequences. However, the firmware updates for Bluetooth devices are often delayed, and some cannot even perform hot updates. Currently, there is a relative lack of tools … Read more