Search
Search Results
-
A vehicle firmware security vulnerability: an IVI exploitation
In the last years, the increasing vehicular technology has led to a surge in cybersecurity attacks, particularly regarding connected vehicles and...
-
Security-enhanced firmware management scheme for smart home IoT devices using distributed ledger technologies
With the increase of IoT devices generating large amounts of user-sensitive data, improper firmware harms users’ security and privacy. Latest home...
-
SoftSSD: enabling rapid flash firmware prototy** for solid-state drives
Recently, solid-state drives (SSDs) have been used in a wide range of emerging data processing systems. Essentially, an SSD is a complex embedded...
-
A survey on IoT & embedded device firmware security: architecture, extraction techniques, and vulnerability analysis frameworks
IoT and Embedded devices grow at an exponential rate, however, without adequate security mechanisms in place. One of the key challenges in the cyber...
-
Introduction to SSD Firmware
Welcome to the world of SSD firmware! This chapter marks the beginning of your journey into the intricate world of solid-state drive (SSD) firmware.... -
SSD Firmware Design Considerations
In this chapter, we will discuss the design considerations for solid-state drive (SSD) firmware. We will start by discussing the different types of... -
Firmware Development A Guide to Specialized Systemic Knowledge
Build your own system firmware. This book helps you understand system firmware architecture and minimalistic design, and provides a specialized...
-
Reproducibility of Firmware Analysis: An Empirical Study
Firmware analysis methods are crucial for IoT security, yet their reproducibility-the ability to replicate results in subsequent research-has not... -
PHI: Pseudo-HAL Identification for Scalable Firmware Fuzzing
Firmware fuzzing aims to detect vulnerabilities in firmware by emulating peripherals at different levels: hardware, register, and function. HAL-Fuzz,... -
System Firmware An Essential Guide to Open Source and Embedded Solutions
Find the right bootloader solution or combination of firmware required to boot a platform considering its security, product features, and optimized...
-
The History and Evolution of SSD Firmware
In this chapter, we delve into the historical evolution of solid-state drive (SSD) firmware, tracing its journey from its rudimentary origins to its... -
A Beginner's Guide to SSD Firmware Designing, Optimizing, and Maintaining SSD Firmware
Explore the concepts and techniques that are essential for designing, optimizing, and maintaining SSD (solid state drive) firmware. This book...
-
Common SSD Firmware Features
In this chapter, we will discuss the common solid-state drive (SSD) firmware features. We will start by discussing the map** table, which is used... -
Firmware-Based DoS Attacks in Wireless Sensor Network
IoT devices are projected to scale up to hundreds of billions by 2030 due to its applications in agriculture, healthcare, environment, manufacturing,... -
Future Developments and Innovations in SSD Firmware
In this chapter, we will discuss the future developments and innovations in solid-state drive (SSD) firmware. As the technology behind SSDs continues... -
A Stealth Security Hardening Method Based on SSD Firmware Function Extension
In recent years, issues related to information security have received increasing attention. Expanding the security-related functionality of SSD... -
Patchman: Firmware Update Delivery Service Over the Blockchain for IoT Environment
This paper proposes Patchman, a firmware binary delivery service for the Internet of Things ecosystem leveraging blockchain. When a new firmware... -
System Firmware Architecture
Architecture is a process that is used for develo** a product. This process includes planning, designing, and constructing. Similarly, the firmware... -
Understanding the Role of Firmware in SSDs
Picture the hardware of a solid-state drive (SSD) as the engine of a car, and the firmware as the driver who controls and optimizes its performance.... -
SplITS: Split Input-to-State Map** for Effective Firmware Fuzzing
Ability to test firmware on embedded devices is critical to discovering vulnerabilities prior to their adversarial exploitation. State-of-the-art...