Skip Content
You are currently on the new version of our website. Access the old version .

41 Results Found

  • Article
  • Open Access
1 Citations
2,739 Views
26 Pages

Microcontroller Units (MCUs) play a vital role in embedded devices due to their energy efficiency and scalability. The firmware in MCUs contains vulnerabilities that can lead to digital and physical harm. However, testing MCU firmware faces challenge...

  • Article
  • Open Access
4 Citations
3,522 Views
20 Pages

A Vulnerability Scanning Method for Web Services in Embedded Firmware

  • Xiaocheng Ma,
  • Chenyv Yan,
  • Yunchao Wang,
  • Qiang Wei and
  • Yunfeng Wang

12 March 2024

As the Internet of Things (IoT) era arrives, the proliferation of IoT devices exposed to the Internet presents a significant challenge to device security. Firmware is software that operates within Internet of Things (IoT) devices, directly governing...

  • Article
  • Open Access
7 Citations
3,276 Views
20 Pages

28 August 2023

With the rapid growth of IoT devices, ensuring the security of embedded firmware has become a critical concern. Despite advances in existing vulnerability discovery methods, previous research has been limited to vulnerabilities occurring in binary pr...

  • Review
  • Open Access
1 Citations
2,309 Views
43 Pages

A Survey of Cross-Layer Security for Resource-Constrained IoT Devices

  • Mamyr Altaibek,
  • Aliya Issainova,
  • Tolegen Aidynov,
  • Daniyar Kuttymbek,
  • Gulsipat Abisheva and
  • Assel Nurusheva

3 September 2025

Low-power microcontrollers, wireless sensors, and embedded gateways form the backbone of many Internet of Things (IoT) deployments. However, their limited memory, constrained energy budgets, and lack of standardized firmware make them attractive targ...

  • Article
  • Open Access
5 Citations
3,014 Views
21 Pages

13 May 2021

The integrated circuit (IC) manufacturing process involves many players, from chip/board design and fabrication to firmware design and installation. In today’s global supply chain, any of these steps are prone to interference from rogue players, crea...

  • Article
  • Open Access
1,047 Views
42 Pages

FirmVulLinker: Leveraging Multi-Dimensional Firmware Profiling for Identifying Homologous Vulnerabilities in Internet of Things Devices

  • Yixuan Cheng,
  • Fengzhi Xu,
  • Lei Xu,
  • Yang Ge,
  • Jingyu Yang,
  • Wenqing Fan,
  • Wei Huang and
  • Wen Liu

28 August 2025

Identifying homologous vulnerabilities across diverse IoT firmware images is critical for large-scale vulnerability auditing and risk assessment. However, existing approaches often rely on coarse-grained components or single-dimensional metrics, lack...

  • Article
  • Open Access
11 Citations
4,112 Views
16 Pages

Blockchain-Based Secure Firmware Update Using an UAV

  • Jong Wan Seo,
  • Anik Islam,
  • Md Masuduzzaman and
  • Soo Young Shin

This paper proposes a blockchain-based firmware update method using unmanned aerial vehicles (UAVs) to solve one of the security issues arising in the Internet of Things (IoT) environment, which is the firmware security problem. It has high scalabili...

  • Article
  • Open Access
1 Citations
2,197 Views
16 Pages

Fine-Grained Forward Secure Firmware Update in Smart Home

  • Qiuxia Zhao,
  • Dong Zheng,
  • Yinghui Zhang and
  • Yan Ren

12 July 2023

Although the vigorous development of smart homes brings great convenience to people’s lives, smart homes usually suffer from various security threats due to firmware vulnerabilities. Firmware update is a possible solution, but existing methods...

  • Review
  • Open Access
47 Citations
18,260 Views
28 Pages

A Review of IoT Firmware Vulnerabilities and Auditing Techniques

  • Taimur Bakhshi,
  • Bogdan Ghita and
  • Ievgeniia Kuzminykh

22 January 2024

In recent years, the Internet of Things (IoT) paradigm has been widely applied across a variety of industrial and consumer areas to facilitate greater automation and increase productivity. Higher dependability on connected devices led to a growing ra...

  • Article
  • Open Access
867 Views
14 Pages

As the use of Internet of Things (IoT) devices becomes extensive, ensuring their security has become a critical issue for both individuals and organizations, particularly as these devices collect, transmit, and analyze diverse data. The firmware of I...

  • Review
  • Open Access
13 Citations
6,874 Views
18 Pages

A Survey of the Security Analysis of Embedded Devices

  • Xu Zhou,
  • Pengfei Wang,
  • Lei Zhou,
  • Peng Xun and
  • Kai Lu

16 November 2023

Embedded devices are pervasive nowadays with the rapid development of the Internet of Things (IoT). This brings significant security issues that make the security analysis of embedded devices important. This paper presents a survey on the security an...

  • Feature Paper
  • Article
  • Open Access
7,357 Views
22 Pages

Delving Deep into Reverse Engineering of UEFI Firmwares via Human Interface Infrastructure

  • Siyi Chen,
  • Yu-An Tan,
  • Kefan Qiu,
  • Zheng Zhang,
  • Yuanzhang Li and
  • Quanxin Zhang

10 November 2023

The Unified Extensible Firmware Interface (UEFI) provides a specification of the software interface between an OS and its underlying platform firmware. UEFI UI is an interactive interface that allows users to configure and manage UEFI settings, which...

  • Article
  • Open Access
15 Citations
6,534 Views
21 Pages

MUP: Simplifying Secure Over-The-Air Update with MQTT for Constrained IoT Devices

  • Kristina Sahlmann,
  • Vera Clemens,
  • Michael Nowak and
  • Bettina Schnor

22 December 2020

Message Queuing Telemetry Transport (MQTT) is one of the dominating protocols for edge- and cloud-based Internet of Things (IoT) solutions. When a security vulnerability of an IoT device is known, it has to be fixed as soon as possible. This requires...

  • Article
  • Open Access
52 Citations
5,191 Views
17 Pages

Blockchain-Based Secure Device Management Framework for an Internet of Things Network in a Smart City

  • Seonghyeon Gong,
  • Erzhena Tcydenova,
  • Jeonghoon Jo,
  • Younghun Lee and
  • Jong Hyuk Park

17 July 2019

The broadly configured smart city network requires a variety of security considerations for a heterogeneous device environment. Because a network of heterogeneous devices facilitates an attacker’s intrusion through a specific device or node, a...

  • Article
  • Open Access
16 Citations
4,275 Views
13 Pages

25 November 2022

Over-the-air (OTA) updating is a critical mechanism for secure internet of things (IoT) systems for remotely updating the firmware (or keys) of IoT devices. Message queue telemetry transport (MQTT) is a very popular internet of things (IoT) communica...

  • Article
  • Open Access
8 Citations
6,132 Views
14 Pages

25 November 2024

The increasing connectivity and complexity of automotive systems require enhanced mechanisms for firmware updates to ensure security and integrity. Traditional methods are insufficient for modern vehicles that require seamless over-the-air (OTA) upda...

  • Article
  • Open Access
15 Citations
5,422 Views
22 Pages

A Blockchain-Based OCF Firmware Update for IoT Devices

  • Elizabeth Nathania Witanto,
  • Yustus Eko Oktian,
  • Sang-Gon Lee and
  • Jin-Heung Lee

26 September 2020

As the usage growth rate of Internet of Things (IoT) devices is increasing, various issues related to these devices need attention. One of them is the distribution of the IoT firmware update. The IoT devices’ software development does not end w...

  • Article
  • Open Access
1,251 Views
24 Pages

Firmware vulnerabilities in embedded devices have caused serious security incidents, necessitating similarity analysis of binary program instruction embeddings to identify vulnerabilities. However, existing instruction embedding methods neglect progr...

  • Article
  • Open Access
1 Citations
1,424 Views
18 Pages

4 July 2025

Nowadays, the world witnesses cyber attacks daily, and these threats are becoming exponentially sophisticated due to advances in Artificial Intelligence (AI). This progress allows adversaries to accelerate malware development and streamline the explo...

  • Article
  • Open Access
6 Citations
3,509 Views
17 Pages

7 August 2022

With the development of 5G and network technology, the usage of IoT devices has become popular. Because most of these IoT devices can be controlled by an adversary away from the administrator, several security issues such as firmware dumping can aris...

  • Article
  • Open Access
6 Citations
2,416 Views
16 Pages

Advanced Driver Assistance Systems (ADASs) are crucial components of intelligent vehicles, equipped with a vast code base. To enhance the security of ADASs, it is essential to mine their vulnerabilities and corresponding exploitation methods. However...

  • Article
  • Open Access
5 Citations
3,578 Views
13 Pages

Optimizing IoT Web Fuzzing by Firmware Infomation Mining

  • Yifei Gao,
  • Xu Zhou,
  • Wei Xie,
  • Baosheng Wang,
  • Enze Wang and
  • Zhenhua Wang

24 June 2022

IoT web fuzzing is an effective way to detect security flaws in IoT devices. However, without enough information of the tested targets, IoT web fuzzing is often blind and inefficient. In this paper, we propose to use static analysis to assist IoT web...

  • Article
  • Open Access
3 Citations
2,839 Views
15 Pages

30 October 2024

This paper provides an overview of several secure boot architectures with a focus on key rotation. It expands on a practitioner note that the authors submitted to the 2023 IEEE Secure Development Conference. Key rotation is important due to the frequ...

  • Article
  • Open Access
2 Citations
5,129 Views
29 Pages

Wireless Local Area Networks (WLANs), particularly Wi-Fi, serve as the backbone of modern connectivity, supporting billions of devices globally and forming a critical component in Internet of Things (IoT) ecosystems. However, the increasing ubiquity...

  • Article
  • Open Access
1 Citations
1,547 Views
21 Pages

2 February 2025

With the increasing utilization of drones, the cyber security threats they face have become more prominent. Code reuse in the software development of drone systems has led to vulnerabilities in drones. The binary code similarity analysis method offer...

  • Article
  • Open Access
4 Citations
4,238 Views
15 Pages

28 November 2020

With the advent of artificial intelligence, the research paradigm in natural language processing has been transitioned from statistical methods to machine learning-based approaches. One application is to develop a deep learning-based language model t...

  • Article
  • Open Access
1 Citations
2,267 Views
31 Pages

Large Language Model-Powered Protected Interface Evasion: Automated Discovery of Broken Access Control Vulnerabilities in Internet of Things Devices

  • Enze Wang,
  • Wei Xie,
  • Shuhuan Li,
  • Runhao Liu,
  • Yuan Zhou,
  • Zhenhua Wang,
  • Shuoyoucheng Ma,
  • Wantong Yang and
  • Baosheng Wang

5 May 2025

Broken access control vulnerabilities pose significant security risks to the protected web interfaces of IoT devices, enabling adversaries to gain unauthorized access to sensitive configurations and even use them as stepping stones for attacking the...

  • Article
  • Open Access
51 Citations
15,629 Views
27 Pages

18 November 2016

The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important f...

  • Review
  • Open Access
1,667 Views
47 Pages

19 November 2025

The increasing adoption of electric vehicles (EVs) and the integration of 5G/6G networks are driving the demand for secure, intelligent, and interoperable charging infrastructure within the Internet of Vehicles (IoV) ecosystem. Electric Vehicle Charg...

  • Article
  • Open Access
10 Citations
3,113 Views
28 Pages

28 January 2022

Ensuring the security of modern cyberphysical devices is the most important task of the modern world. The reason for this is that such devices can cause not only informational, but also physical damage. One of the approaches to solving the problem is...

  • Article
  • Open Access
5 Citations
5,850 Views
18 Pages

Combating the OS-level malware is a very challenging problem as this type of malware can compromise the operating system, obtaining the kernel privilege and subverting almost all the existing anti-malware tools. This work aims to address this problem...

  • Article
  • Open Access
1 Citations
359 Views
30 Pages

26 December 2025

The proliferation of Internet of Things (IoT) applications in safety-critical domains, such as healthcare, smart transportation, and industrial automation, demands robust solutions for data integrity, traceability, and security that surpass the capab...

  • Review
  • Open Access
40 Citations
18,113 Views
53 Pages

30 June 2023

The Internet of Things (IoT) has transformed various domains in our lives by enabling seamless communication and data exchange between interconnected devices, necessitating robust networking infrastructure. This paper presents a comprehensive analysi...

  • Article
  • Open Access
496 Views
29 Pages

Modern cryptographic systems increasingly depend on certified hardware modules to guarantee trustworthy key management, tamper resistance, and secure execution across Internet of Things (IoT), embedded, and cloud infrastructures. Although numerous FI...

  • Article
  • Open Access
13 Citations
4,881 Views
22 Pages

Low-Cost, Low-Power Edge Computing System for Structural Health Monitoring in an IoT Framework

  • Eduardo Hidalgo-Fort,
  • Pedro Blanco-Carmona,
  • Fernando Muñoz-Chavero,
  • Antonio Torralba and
  • Rafael Castro-Triguero

5 August 2024

A complete low-power, low-cost and wireless solution for bridge structural health monitoring is presented. This work includes monitoring nodes with modular hardware design and low power consumption based on a control and resource management board cal...

  • Article
  • Open Access
9 Citations
11,925 Views
27 Pages

A Practical Performance Benchmark of Post-Quantum Cryptography Across Heterogeneous Computing Environments

  • Maryam Abbasi,
  • Filipe Cardoso,
  • Paulo Váz,
  • José Silva and
  • Pedro Martins

The emergence of large-scale quantum computing presents an imminent threat to contemporary public-key cryptosystems, with quantum algorithms such as Shor’s algorithm capable of efficiently breaking RSA and elliptic curve cryptography (ECC). Thi...

  • Article
  • Open Access
14 Citations
5,876 Views
12 Pages

4 August 2017

This article proposes a novel, web-based, remote monitoring and control system design for a building’s electrical power, green power generation and environmental system that will save energy. The supervisory control system is based on the use of dist...

  • Article
  • Open Access
4 Citations
5,449 Views
24 Pages

31 December 2023

Smart home environments, which consist of various Internet of Things (IoT) devices to support and improve our daily lives, are expected to be widely adopted in the near future. Owing to a lack of awareness regarding the risks associated with IoT devi...

  • Article
  • Open Access
1,308 Views
25 Pages

4 August 2025

The exponential growth of autonomous systems demands robust security mechanisms that can operate within the extreme constraints of real-time embedded environments. This paper introduces SMART DShot, a groundbreaking machine learning-enhanced framewor...

  • Article
  • Open Access
49 Citations
10,542 Views
20 Pages

18 September 2019

This work demonstrates an open-source hardware and software platform for monitoring the performance of buildings, called Elemental, that is designed to provide data on indoor environmental quality, energy usage, HVAC operation, and other factors to i...

  • Proceeding Paper
  • Open Access
4 Citations
4,144 Views
7 Pages

Implementation of an Advanced Health-Monitoring System Capable of Real-Time Analysis and Alerting

  • Kumari Pragya Prayesi,
  • Shabana Azami,
  • Vineet Raj Singh Kushwah,
  • Sagarika Nayak,
  • Santosh Yerasuri,
  • T. Sumallika and
  • Mohit Gupta

The integration of technology into healthcare has moved from being a luxury to being a need at a time when there is an ever-increasing focus on individual health and wellbeing. The real-time monitoring of one’s health metrics and prompt alerts...