데이터 흐름분석을 통한 심볼이 제거된 임베디드 시스템의 취약점 탐지
Vol. 35, No. 2, pp. 287-298,
4월.
2025
10.13089/JKIISC.2025.35.2.287,
Full Text:
Keywords: firmware, Static Analysis, Binary Similarity
Abstract Statistics
Cite this article


Keywords: firmware, Static Analysis, Binary Similarity
Abstract Statistics
Cite this article
[IEEE Style]
박성준, 박상준, 조해현, 서창배, 류한얼, 조병모, "Detecting Vulnerabilities in Symbol-Deprived Embedded Systems with Data Flow Analysis," Journal of The Korea Institute of Information Security and Cryptology, vol. 35, no. 2, pp. 287-298, 2025. DOI: 10.13089/JKIISC.2025.35.2.287.
[ACM Style]
박성준, 박상준, 조해현, 서창배, 류한얼, and 조병모. 2025. Detecting Vulnerabilities in Symbol-Deprived Embedded Systems with Data Flow Analysis. Journal of The Korea Institute of Information Security and Cryptology, 35, 2, (2025), 287-298. DOI: 10.13089/JKIISC.2025.35.2.287.