I'm really excited to see progress on the (HARD) problem of embedded emulation for security! Two recent and very promising papers:
-
-
And recently accepted to USENIX Security 2020, Long Lu and his students have P²IM, which eschews real hardware altogether and tries to build peripheral models on the fly while fuzzing: https://arxiv.org/abs/1909.06472
Prikaži ovu nit -
Needless to say, both have tons of limitations, and there is a long, LONG way to go before we can declare rehosting a solved problem. But this is an exciting start. :)
Prikaži ovu nit
Kraj razgovora
Novi razgovor -
-
-
Oh man, people are gonna be terrified of their peripherals.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.