Completed
Research Background
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Why should we analyze firmware
- 3 Common vulnerabilities
- 4 Protection mechanisms
- 5 Firmwares challenges
- 6 Dynamic analysis
- 7 Dynamic analysis limitations
- 8 Static analysis
- 9 Firmware is mostly multibinary
- 10 Binary architecture
- 11 Example
- 12 Research Background
- 13 Canon Architecture
- 14 Firmware Packing
- 15 Border Binary
- 16 Parsing Score
- 17 Binary Dependency Graph
- 18 Semantic CPF
- 19 The Problem
- 20 Insecure Interaction Detection
- 21 Data Analysis
- 22 Intention
- 23 Team dependencies
- 24 Evaluation
- 25 Experiments
- 26 Evaluation Results
- 27 Evaluation Results Summary
- 28 GitHub
- 29 Conclusion