{"id":"https://openalex.org/W4389331493","doi":"https://doi.org/10.1109/tdsc.2023.3339569","title":"AIM: Automatic Interrupt Modeling for Dynamic Firmware Analysis","display_name":"AIM: Automatic Interrupt Modeling for Dynamic Firmware Analysis","publication_year":2023,"publication_date":"2023-12-05","ids":{"openalex":"https://openalex.org/W4389331493","doi":"https://doi.org/10.1109/tdsc.2023.3339569"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2023.3339569","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/tdsc.2023.3339569","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100778553","display_name":"Bo Feng","orcid":"https://orcid.org/0000-0001-9764-7457"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Bo Feng","raw_affiliation_strings":["School of Cybersecurity and Privacy, College of Computing, Georgia Institute of Technology, Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"School of Cybersecurity and Privacy, College of Computing, Georgia Institute of Technology, Atlanta, GA, USA","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071019154","display_name":"Meng Luo","orcid":"https://orcid.org/0000-0001-9018-1367"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Meng Luo","raw_affiliation_strings":["School of Cyber Science and Technology &amp; ZJU-Hangzhou Global Scientific and Technological Innovation Center, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology &amp; ZJU-Hangzhou Global Scientific and Technological Innovation Center, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100785773","display_name":"Changming Liu","orcid":"https://orcid.org/0009-0006-6398-9460"},"institutions":[{"id":"https://openalex.org/I12912129","display_name":"Northeastern University","ror":"https://ror.org/04t5xt781","country_code":"US","type":"education","lineage":["https://openalex.org/I12912129"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Changming Liu","raw_affiliation_strings":["Khoury College of Computer Sciences, Northeastern University, Boston, MA, USA"],"affiliations":[{"raw_affiliation_string":"Khoury College of Computer Sciences, Northeastern University, Boston, MA, USA","institution_ids":["https://openalex.org/I12912129"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013217302","display_name":"Long Lu","orcid":"https://orcid.org/0000-0003-1550-479X"},"institutions":[{"id":"https://openalex.org/I12912129","display_name":"Northeastern University","ror":"https://ror.org/04t5xt781","country_code":"US","type":"education","lineage":["https://openalex.org/I12912129"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Long Lu","raw_affiliation_strings":["Khoury College of Computer Sciences, Northeastern University, Boston, MA, USA"],"affiliations":[{"raw_affiliation_string":"Khoury College of Computer Sciences, Northeastern University, Boston, MA, USA","institution_ids":["https://openalex.org/I12912129"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077875821","display_name":"Engin Kirda","orcid":"https://orcid.org/0000-0001-9988-6873"},"institutions":[{"id":"https://openalex.org/I12912129","display_name":"Northeastern University","ror":"https://ror.org/04t5xt781","country_code":"US","type":"education","lineage":["https://openalex.org/I12912129"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Engin Kirda","raw_affiliation_strings":["Khoury College of Computer Sciences, Northeastern University, Boston, MA, USA"],"affiliations":[{"raw_affiliation_string":"Khoury College of Computer Sciences, Northeastern University, Boston, MA, USA","institution_ids":["https://openalex.org/I12912129"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100778553"],"corresponding_institution_ids":["https://openalex.org/I130701444"],"apc_list":null,"apc_paid":null,"fwci":0.8718,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.7973041,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"21","issue":"4","first_page":"3866","last_page":"3882"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/firmware","display_name":"Firmware","score":0.9822137355804443},{"id":"https://openalex.org/keywords/interrupt","display_name":"Interrupt","score":0.8441683053970337},{"id":"https://openalex.org/keywords/microcontroller","display_name":"Microcontroller","score":0.7272434234619141},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7268540859222412},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.6889803409576416},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.5712873935699463},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5528091788291931},{"id":"https://openalex.org/keywords/microcode","display_name":"Microcode","score":0.5188758969306946},{"id":"https://openalex.org/keywords/embedded-software","display_name":"Embedded software","score":0.4540369212627411},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.4500919282436371},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3258395195007324}],"concepts":[{"id":"https://openalex.org/C67212190","wikidata":"https://www.wikidata.org/wiki/Q104851","display_name":"Firmware","level":2,"score":0.9822137355804443},{"id":"https://openalex.org/C41661131","wikidata":"https://www.wikidata.org/wiki/Q220764","display_name":"Interrupt","level":3,"score":0.8441683053970337},{"id":"https://openalex.org/C173018170","wikidata":"https://www.wikidata.org/wiki/Q165678","display_name":"Microcontroller","level":2,"score":0.7272434234619141},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7268540859222412},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.6889803409576416},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.5712873935699463},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5528091788291931},{"id":"https://openalex.org/C22174128","wikidata":"https://www.wikidata.org/wiki/Q175869","display_name":"Microcode","level":2,"score":0.5188758969306946},{"id":"https://openalex.org/C154488198","wikidata":"https://www.wikidata.org/wiki/Q1335007","display_name":"Embedded software","level":3,"score":0.4540369212627411},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.4500919282436371},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3258395195007324}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2023.3339569","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/tdsc.2023.3339569","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G8838838634","display_name":null,"funder_award_id":"124009-N72402","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322429","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W1966431236","https://openalex.org/W608147619","https://openalex.org/W1984676852","https://openalex.org/W2026551898","https://openalex.org/W4252104358","https://openalex.org/W2062160093","https://openalex.org/W2025981307","https://openalex.org/W1998626163","https://openalex.org/W2056006243","https://openalex.org/W2039978824"],"abstract_inverted_index":{"The":[0],"security":[1],"of":[2,26,37],"microcontrollers,":[3],"which":[4],"drive":[5],"modern":[6],"IoT":[7],"and":[8,63,105,126,151,198],"embedded":[9],"devices,":[10],"continues":[11],"to":[12,50,93,162,169],"raise":[13],"major":[14],"concerns.":[15],"Within":[16],"a":[17,23,35,117,134,187,190],"microcontroller":[18],"(MCU),":[19],"the":[20,30,40,70,76,79],"firmware":[21,44,52,108,132,192,204],"is":[22,48,90],"monolithic":[24],"piece":[25],"software":[27,32,55],"that":[28,111],"contains":[29,45],"whole":[31],"stack,":[33],"whereas":[34],"variety":[36],"peripherals":[38,73,115],"represent":[39],"hardware.":[41],"As":[42],"MCU":[43,72,88,114,159],"vulnerabilities,":[46],"it":[47],"ideal":[49],"test":[51],"with":[53,189],"off-the-shelf":[54],"testing":[56,163,205],"techniques,":[57],"such":[58],"as":[59],"dynamic":[60,107,153,195],"symbolic":[61,154,196],"execution":[62,155,197],"fuzzing.":[64],"Nevertheless,":[65],"no":[66],"emulator":[67],"can":[68,201],"emulate":[69],"diverse":[71],"or":[74],"execute/test":[75],"firmware.":[77,160],"Specifically,":[78],"interrupt":[80,119],"interface,":[81],"among":[82],"all":[83],"I/O":[84],"interfaces":[85],"used":[86],"by":[87,116,133],"peripherals,":[89],"extremely":[91],"challenging":[92,181],"emulate.":[94],"In":[95],"this":[96],"article,":[97],"we":[98],"present":[99],"<monospace":[100,122,148],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[101,123,138,149],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">AIM</monospace>\u2014a":[102],"generic,":[103],"scalable,":[104],"hardware-independent":[106],"analysis":[109],"framework":[110,146,166],"supports":[112],"unemulated":[113],"novel":[118],"modeling":[120],"mechanism.":[121],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">AIM</monospace>":[124],"effectively":[125],"efficiently":[127],"covers":[128],"interrupt-dependent":[129,173],"code":[130,174],"in":[131,147],"novel,":[135],"firmware-guided,":[136],"<italic":[137],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">Just-in-Time":[139],"Interrupt":[140],"Firing</i>":[141],"technique.":[142],"We":[143],"implemented":[144],"our":[145,165],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">angr</monospace>":[150],"performed":[152],"for":[156],"eight":[157],"real-world":[158],"According":[161],"results,":[164],"covered":[167],"up":[168],"11.2":[170],"times":[171],"more":[172],"than":[175],"state-of-the-art":[176,191],"approaches":[177],"while":[178],"accomplishing":[179],"several":[180],"goals":[182],"not":[183],"feasible":[184],"previously.":[185],"Finally,":[186],"comparison":[188],"fuzzer":[193],"demonstrates":[194],"fuzzing":[199],"together":[200],"achieve":[202],"better":[203],"coverage.":[206]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
