A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Femto-Containers: DevOps on Microcontrollers with Lightweight Virtualization Isolation for IoT Software Modules
[article]
2021
arXiv
pre-print
As proof-of-concept, we implemented and evaluated Femto-Containers on popular microcontroller architectures (Arm Cortex-M, ESP32 and RISC-V), using eBPF virtualization, and RIOT, a common operating system ...
Meanwhile the Internet of Things (IoT) connects more and more devices which are not covered by DevOps tools: low-power, microcontroller-based devices. ...
RISC-V, ESP32). ...
arXiv:2106.12553v2
fatcat:6x6546nszrathc7vnxwukcrjbm
μAFL: Non-intrusive Feedback-driven Fuzzing for Microcontroller Firmware
[article]
2022
pre-print
It leverages debugging tools in existing embedded system development to construct an AFL-compatible fuzzing framework. ...
In this work, we present μAFL, a hardware-in-the-loop approach to fuzzing microcontroller firmware. ...
ACKNOWLEDGMENTS We thank engineers from SEGGER Microcontroller for their tireless technical support in using JLink SDK and permitting us to distribute our work as an open-source project. We thank Dr. ...
doi:10.1145/3510003.3510208
arXiv:2202.03013v1
fatcat:a5fejyergnempff64mahpez4vy
Techniques to Improve Reliability in an IoT Architecture Framework for Intelligent Products
2021
IEEE Access
They all play an important role in determining the level of reliability of the novel Internet of Things (IoT) architecture framework for intelligent products presented in the article. ...
A new formula is proposed for assessing the reliability of a SCS based on metrics from each of the five areas. ...
ACKNOWLEDGMENT We would like to thank our employing companies, RID International Center, Focus Innovazione and Tesagon International for supporting the POKET research project and the publication of this ...
doi:10.1109/access.2021.3072168
fatcat:6ajmglnnqbaxnhx7776bajcrxq
On the Design of IoT Security: Analysis of Software Vulnerabilities for Smart Grids
2021
Energies
The 5G communication network will underpin a vast number of new and emerging services, paving the way for unprecedented performance and capabilities in mobile networks. ...
provisions may be undermined by software-rooted vulnerabilities in IoT devices that allow threat actors to compromise the devices, demote confidentiality, integrity and availability, and even pose risks for ...
These servers are typically used in microcontrollers such as Pycom [57] , ESP32 [58] , and STM32 [59] . Both versions of the server are licensed under a MIT license. ...
doi:10.3390/en14102818
fatcat:tgpbzjsntnbsffqhbwqdb264eu
System memory protection and vulnerability assessment in presence of software attacks
2021
For each specific vulnerability, our mitigation either leverages a new CPU features such as Intel SGX or an existing CPU feature in a novel way to achieve adequate protection with a modest performance ...
Qemu [15] with the dynamic binary translation (DBT) [47] engine is a unique approach for fuzzing. ...
Techniques such as leveraging hardware watchpoints or transactional memory are fittable for fuzzing such vulnerabilities but not for run-time protection. ...
doi:10.7282/t3-93x2-2f36
fatcat:gbofmgzffbgrrdjhzxlz6vpjwa