all InfoSec news
Abusing Processor Exception for General Binary Instrumentation on Bare-metal Embedded Devices
April 25, 2024, 7:11 p.m. | Shipei Qu, Xiaolin Zhang, Chi Zhang, Dawu Gu
cs.CR updates on arXiv.org arxiv.org
Abstract: Analyzing the security of closed-source drivers and libraries in embedded systems holds significant importance, given their fundamental role in the supply chain. Unlike x86, embedded platforms lack comprehensive binary manipulating tools, making it difficult for researchers and developers to effectively detect and patch security issues in such closed-source components. Existing works either depend on full-fledged operating system features or suffer from tedious corner cases, restricting their application to bare-metal firmware prevalent in embedded environments. In …
abusing arxiv binary cs.cr detect developers devices drivers effectively embedded embedded devices embedded systems general instrumentation libraries making metal patch platforms processor researchers role security supply supply chain systems tools x86
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
Information Security Engineers
@ D. E. Shaw Research | New York City
Technology Security Analyst
@ Halton Region | Oakville, Ontario, Canada
Senior Cyber Security Analyst
@ Valley Water | San Jose, CA
Senior - Penetration Tester
@ Deloitte | Madrid, España
Associate Cyber Incident Responder
@ Highmark Health | PA, Working at Home - Pennsylvania
Senior Insider Threat Analyst
@ IT Concepts Inc. | Woodlawn, Maryland, United States