{"title":"分析成千上万的固件映像和一些物理设备:下一步是什么?","authors":"Aurélien Francillon","doi":"10.1145/2995289.2995296","DOIUrl":null,"url":null,"abstract":"This talk will make an overview of security problems that have been found with both large scale automated static analysis (within the firmware.re project) and with more focused and more manual dynamic analysis (using the Avatar project). I will then discuss what I think we can do about it and how.","PeriodicalId":130056,"journal":{"name":"Proceedings of the 6th International Workshop on Trustworthy Embedded Devices","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Analyzing Thousands of Firmware Images and a Few Physical Devices: What's Next?\",\"authors\":\"Aurélien Francillon\",\"doi\":\"10.1145/2995289.2995296\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This talk will make an overview of security problems that have been found with both large scale automated static analysis (within the firmware.re project) and with more focused and more manual dynamic analysis (using the Avatar project). I will then discuss what I think we can do about it and how.\",\"PeriodicalId\":130056,\"journal\":{\"name\":\"Proceedings of the 6th International Workshop on Trustworthy Embedded Devices\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-10-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 6th International Workshop on Trustworthy Embedded Devices\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2995289.2995296\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 6th International Workshop on Trustworthy Embedded Devices","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2995289.2995296","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Analyzing Thousands of Firmware Images and a Few Physical Devices: What's Next?
This talk will make an overview of security problems that have been found with both large scale automated static analysis (within the firmware.re project) and with more focused and more manual dynamic analysis (using the Avatar project). I will then discuss what I think we can do about it and how.