A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is
As proof-of-concept, we implemented and evaluated Femto-Containers on popular microcontroller architectures (Arm Cortex-M, ESP32 and RISC-V), using eBPF virtualization, and RIOT, a common operating system ... Meanwhile the Internet of Things (IoT) connects more and more devices which are not covered by DevOps tools: low-power, microcontroller-based devices. ... RISC-V, ESP32). ...arXiv:2106.12553v2 fatcat:6x6546nszrathc7vnxwukcrjbm
It leverages debugging tools in existing embedded system development to construct an AFL-compatible fuzzing framework. ... In this work, we present μAFL, a hardware-in-the-loop approach to fuzzing microcontroller firmware. ... ACKNOWLEDGMENTS We thank engineers from SEGGER Microcontroller for their tireless technical support in using JLink SDK and permitting us to distribute our work as an open-source project. We thank Dr. ...doi:10.1145/3510003.3510208 arXiv:2202.03013v1 fatcat:a5fejyergnempff64mahpez4vy
They all play an important role in determining the level of reliability of the novel Internet of Things (IoT) architecture framework for intelligent products presented in the article. ... A new formula is proposed for assessing the reliability of a SCS based on metrics from each of the five areas. ... ACKNOWLEDGMENT We would like to thank our employing companies, RID International Center, Focus Innovazione and Tesagon International for supporting the POKET research project and the publication of this ...doi:10.1109/access.2021.3072168 fatcat:6ajmglnnqbaxnhx7776bajcrxq
The 5G communication network will underpin a vast number of new and emerging services, paving the way for unprecedented performance and capabilities in mobile networks. ... provisions may be undermined by software-rooted vulnerabilities in IoT devices that allow threat actors to compromise the devices, demote confidentiality, integrity and availability, and even pose risks for ... These servers are typically used in microcontrollers such as Pycom  , ESP32  , and STM32  . Both versions of the server are licensed under a MIT license. ...doi:10.3390/en14102818 fatcat:tgpbzjsntnbsffqhbwqdb264eu
For each specific vulnerability, our mitigation either leverages a new CPU features such as Intel SGX or an existing CPU feature in a novel way to achieve adequate protection with a modest performance ... Qemu  with the dynamic binary translation (DBT)  engine is a unique approach for fuzzing. ... Techniques such as leveraging hardware watchpoints or transactional memory are fittable for fuzzing such vulnerabilities but not for run-time protection. ...doi:10.7282/t3-93x2-2f36 fatcat:gbofmgzffbgrrdjhzxlz6vpjwa