Determining image base of firmware for ARM devices by matching literal pools

Digital Investigation - Tập 16 - Trang 19-28 - 2016
Ruijin Zhu1, Yu-an Tan1, Quanxin Zhang2, Yuanzhang Li1, Jun Zheng1,2
1School of Computer Science and Technology, Beijing Institute of Technology, Beijing 100081, China
2Research Center of Massive Language Information Processing and Cloud Computing Application, Beijing, 100081, China

Tài liệu tham khảo

ARM, 2013 ARM, 2014 Basnight, 2013, Analysis of programmable logic controller firmware for threat assessment and forensic investigation, 9 Basnight, 2013, Firmware modification attacks on programmable logic controllers, Int J Crit Infrastruct Prot, 6, 76, 10.1016/j.ijcip.2013.04.004 Costin, 2014, A large-scale analysis of the security of embedded firmwares, 95 Cui, 2013, When firmware modifications attack: a case study of embedded exploitation Driessen, 2012, Don't trust satellite phones: a security analysis of two satphone standards, 128 Heffner, 2011 Heffner, 2013 Heffner, 2013 Heffner, 2015 Hemel, 2009 Peck, 2009, Leveraging ethernet card vulnerabilities in field devices, 1 Santamarta, 2011 Schuett, 2014 Schuett, 2014, An evaluation of modification attacks on programmable logic controllers, Int J Crit Infrastruct Prot, 7, 61, 10.1016/j.ijcip.2014.01.004 Skochinsky, 2010, Intro to embedded reverse engineering for pc reversers Yoo, 2015, Case study of the vulnerability of otp implemented in internet banking systems of south korea, Multimedia Tools Appl, 74, 3289, 10.1007/s11042-014-1888-3 Zaddach, 2013, Embedded devices security and firmware reverse engineering Zaddach, 2014, Avatar: a framework to support dynamic security analysis of embedded systems' firmwares Zhang, 2015, Descrambling data on solid-state disks by reverse-engineering the firmware, Digit Investig, 12, 77, 10.1016/j.diin.2014.12.003 Zhu, 2016