Firmware vulnerability analysis based on formal verification of software and hardware
In order to analyze the potential vulnerabilities in the firmware systematically and effectively,a formal verification method based on TLA,in a collaborated form of software and hardware was proposed.With this method,the interaction mechanism of software and hardware in the computer boot process was...
Saved in:
Main Authors: | Peng-hui ZHANG, Xi TIAN, Kang-wei LOU |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2016-07-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00071 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
IoT Firmware Emulation and Its Security Application in Fuzzing: A Critical Revisit
by: Wei Zhou, et al.
Published: (2025-01-01) -
Framework to analyze and exploit the smart home IoT firmware
by: Keshav Kaushik, et al.
Published: (2025-02-01) -
Design, implementation and formal verification of BGP proxy for mimic router
by: Jin ZHANG, et al.
Published: (2023-03-01) -
Control and diagnostics of faults in hardware-software complex
by: D. A. Pankov, et al.
Published: (2018-04-01) -
State-of-the-art survey of smart contract verification based on formal methods
by: Wenbo ZHANG, et al.
Published: (2022-08-01)