BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Memento EPFL//
BEGIN:VEVENT
SUMMARY:Automating Security Vulnerability Detection and Analysis in Embedd
 ed Systems Through Efficient Rehosting
DTSTART:20220627T160000
DTEND:20220627T180000
DTSTAMP:20260502T091153Z
UID:402a1872c59b51d1fba2e547b33eadaabe434c3b16da9c40367b6633
CATEGORIES:Conferences - Seminars
DESCRIPTION:Florian Hofhammer\nEDIC candidacy exam\nExam president: Prof. 
 James Larus\nThesis advisor: Prof. Mathias Payer\nCo-examiner: Prof. Sanid
 hya Kashyap\n\nAbstract\nRehosting describes the realm of executing embedd
 ed\nsystem firmwares on a general-purpose computer with the\ngoal of impro
 ving introspection into the firmware. While the\nlatter is sometimes possi
 ble on the real device thanks to hardware\ndebug interfaces\, consumer dev
 ices often lack such interfaces\nand do not allow researchers to analyze t
 he internals of an\nembedded system firmware during its execution.\nGainin
 g those introspection capabilities through rehosting comes at a cost\, how
 ever.\nFirmwares typically have other expectations towards\nOperating Syst
 ems (OSs) (if one is present at all) and hardware\nperipherals than classi
 c software targeting the end user\, which\nneed to be accommodated by reho
 sting systems.\nIn this work\, we present a Systematization of Knowledge (
 SoK)\nproviding a classification of embedded systems\, formalizing the\nre
 hosting process\, and highlighting the difficulties of rehosting.\nAfterwa
 rds\, we introduce two rehosting-based dynamic analysis\nsystems\, targeti
 ng different classes of firmware and interfaces\nto the inspected firmware
 s.\nWe note that previous systems have shortcomings in scope and applicabi
 lity of their implementation\,\nand shed more light on those during\n\nBac
 kground papers\n1. D. D. Chen\, M. Egele\, M. Woo\, and D. Brumley\, “To
 wards Automated Dynamic Analysis for Linux-based Embedded Firmware\,” pr
 esented at the Network and Distributed System Security Symposium\, San Die
 go\, CA\, 2016. doi: 10.14722/ndss.2016.23415.\n\n2. A. A. Clements et al.
 \, “HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation
 \,” in 29th USENIX Security Symposium\, USENIX Security 2020\, August 12
 -14\, 2020\, 2020\, pp. 1201–1218. [Online]. Available: https://www.usen
 ix.org/conference/usenixsecurity20/presentation/clements\n\n3. A. Fasano e
 t al.\, “SoK: Enabling Security Analyses of Embedded Systems via Rehosti
 ng\,” in Proceedings of the 2021 ACM Asia Conference on Computer and Com
 munications Security\, Virtual Event Hong Kong\, May 2021\, pp. 687–701.
  doi: 10.1145/3433210.3453093.\n\n 
LOCATION:BC 129 https://plan.epfl.ch/?room==BC%20129
STATUS:CONFIRMED
END:VEVENT
END:VCALENDAR
