Determining image base of firmware for ARM devices by matching literal pools
Tài liệu tham khảo
ARM, 2013
ARM, 2014
Basnight, 2013, Analysis of programmable logic controller firmware for threat assessment and forensic investigation, 9
Basnight, 2013, Firmware modification attacks on programmable logic controllers, Int J Crit Infrastruct Prot, 6, 76, 10.1016/j.ijcip.2013.04.004
Costin, 2014, A large-scale analysis of the security of embedded firmwares, 95
Cui, 2013, When firmware modifications attack: a case study of embedded exploitation
Driessen, 2012, Don't trust satellite phones: a security analysis of two satphone standards, 128
Heffner, 2011
Heffner, 2013
Heffner, 2013
Heffner, 2015
Hemel, 2009
Peck, 2009, Leveraging ethernet card vulnerabilities in field devices, 1
Santamarta, 2011
Schuett, 2014
Schuett, 2014, An evaluation of modification attacks on programmable logic controllers, Int J Crit Infrastruct Prot, 7, 61, 10.1016/j.ijcip.2014.01.004
Skochinsky, 2010, Intro to embedded reverse engineering for pc reversers
Yoo, 2015, Case study of the vulnerability of otp implemented in internet banking systems of south korea, Multimedia Tools Appl, 74, 3289, 10.1007/s11042-014-1888-3
Zaddach, 2013, Embedded devices security and firmware reverse engineering
Zaddach, 2014, Avatar: a framework to support dynamic security analysis of embedded systems' firmwares
Zhang, 2015, Descrambling data on solid-state disks by reverse-engineering the firmware, Digit Investig, 12, 77, 10.1016/j.diin.2014.12.003
Zhu, 2016