Implementing a high-efficiency similarity analysis approach for firmware code.
The rapid expansion of the open-source community has shortened the software development cycle, but the spread of vulnerabilities has been accelerated, especially in the field of the Internet of Things. In recent years, the frequency of attacks against connected devices is increasing exponentially; t...
Main Authors: | Yisen Wang, Ruimin Wang, Jing Jing, Huanwei Wang |
---|---|
Format: | Article |
Language: | English |
Published: |
Public Library of Science (PLoS)
2021-01-01
|
Series: | PLoS ONE |
Online Access: | https://doi.org/10.1371/journal.pone.0245098 |
Similar Items
-
Staged Method of Code Similarity Analysis for Firmware Vulnerability Detection
by: Yisen Wang, et al.
Published: (2019-01-01) -
Machine Learning-Based Code Auto-Completion Implementation for Firmware Developers
by: Junghyun Kim, et al.
Published: (2020-11-01) -
Efficient implementation of low cost and secure framework with firmware updates
by: Ines Ben Hlima, et al.
Published: (2023-07-01) -
A Firmware Code Gene Extraction Technology for IoT Terminal
by: Xinbing Zhu, et al.
Published: (2019-01-01) -
The firmware handbook /
by: Ganssle, Jack
Published: (2004)