all InfoSec news
Abusing Processor Exception for General Binary Instrumentation on Bare-metal Embedded Devices
April 25, 2024, 7:11 p.m. | Shipei Qu, Xiaolin Zhang, Chi Zhang, Dawu Gu
cs.CR updates on arXiv.org arxiv.org
Abstract: Analyzing the security of closed-source drivers and libraries in embedded systems holds significant importance, given their fundamental role in the supply chain. Unlike x86, embedded platforms lack comprehensive binary manipulating tools, making it difficult for researchers and developers to effectively detect and patch security issues in such closed-source components. Existing works either depend on full-fledged operating system features or suffer from tedious corner cases, restricting their application to bare-metal firmware prevalent in embedded environments. In …
abusing arxiv binary cs.cr detect developers devices drivers effectively embedded embedded devices embedded systems general instrumentation libraries making metal patch platforms processor researchers role security supply supply chain systems tools x86
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
Sr Cyber Threat Hunt Researcher
@ Peraton | Beltsville, MD, United States
Lead Consultant, Hydrogeologist
@ WSP | Chattanooga, TN, United States
Senior Security Engineer - Netskope/Proofpoint
@ Sainsbury's | London, London, United Kingdom
Senior Technical Analyst-Network Security
@ Computacenter | Bengaluru Bengaluru (Bengaluru, IN, 560025
Senior DevSecOps Engineer - Clearance Required
@ Logistics Management Institute | Remote, United States
Software Test Automation Manager - Cloud Security
@ Tenable | Israel - Office - CS