{"id":"https://openalex.org/W4308411344","doi":"https://doi.org/10.1145/3548606.3559386","title":"What Your Firmware Tells You Is Not How You Should Emulate It","display_name":"What Your Firmware Tells You Is Not How You Should Emulate It","publication_year":2022,"publication_date":"2022-11-07","ids":{"openalex":"https://openalex.org/W4308411344","doi":"https://doi.org/10.1145/3548606.3559386"},"language":"en","primary_location":{"id":"doi:10.1145/3548606.3559386","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3548606.3559386","pdf_url":null,"source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001673339","display_name":"Wei Zhou","orcid":"https://orcid.org/0000-0001-7834-0839"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]},{"id":"https://openalex.org/I92403157","display_name":"University of Science and Technology Beijing","ror":"https://ror.org/02egmk993","country_code":"CN","type":"education","lineage":["https://openalex.org/I92403157"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wei Zhou","raw_affiliation_strings":["School of Cyber Science and Engineering, Huazhong University of Science and Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Huazhong University of Science and Technology, Beijing, China","institution_ids":["https://openalex.org/I47720641","https://openalex.org/I92403157"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100322329","display_name":"Lan Zhang","orcid":"https://orcid.org/0000-0003-3964-8034"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lan Zhang","raw_affiliation_strings":["College of Information Sciences and Technology, The Pennsylvania State University, state college, PA, USA"],"affiliations":[{"raw_affiliation_string":"College of Information Sciences and Technology, The Pennsylvania State University, state college, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057991555","display_name":"Le Guan","orcid":"https://orcid.org/0000-0002-8205-5616"},"institutions":[{"id":"https://openalex.org/I165733156","display_name":"University of Georgia","ror":"https://ror.org/00te3t702","country_code":"US","type":"education","lineage":["https://openalex.org/I165733156"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Le Guan","raw_affiliation_strings":["School of Computing, University of Georgia, Athens, GA, USA"],"affiliations":[{"raw_affiliation_string":"School of Computing, University of Georgia, Athens, GA, USA","institution_ids":["https://openalex.org/I165733156"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100346828","display_name":"Peng Liu","orcid":"https://orcid.org/0000-0002-5091-8464"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Peng Liu","raw_affiliation_strings":["College of Information Sciences and Technology, The Pennsylvania State University, state college, PA, USA"],"affiliations":[{"raw_affiliation_string":"College of Information Sciences and Technology, The Pennsylvania State University, state college, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100401884","display_name":"Yuqing Zhang","orcid":"https://orcid.org/0000-0001-8306-7195"},"institutions":[{"id":"https://openalex.org/I4210108629","display_name":"Computer Network Information Center","ror":"https://ror.org/01s0wyf50","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210108629"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuqing Zhang","raw_affiliation_strings":["National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210108629","https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5001673339"],"corresponding_institution_ids":["https://openalex.org/I47720641","https://openalex.org/I92403157"],"apc_list":null,"apc_paid":null,"fwci":1.8439,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.86552567,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"3269","last_page":"3283"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/firmware","display_name":"Firmware","score":0.9603760838508606},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8667291402816772},{"id":"https://openalex.org/keywords/emulation","display_name":"Emulation","score":0.7761620283126831},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.51607745885849},{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.491240918636322},{"id":"https://openalex.org/keywords/bytecode","display_name":"Bytecode","score":0.42247462272644043},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3675987720489502},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3502280116081238},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.29107651114463806},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.21639597415924072}],"concepts":[{"id":"https://openalex.org/C67212190","wikidata":"https://www.wikidata.org/wiki/Q104851","display_name":"Firmware","level":2,"score":0.9603760838508606},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8667291402816772},{"id":"https://openalex.org/C149810388","wikidata":"https://www.wikidata.org/wiki/Q5374873","display_name":"Emulation","level":2,"score":0.7761620283126831},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.51607745885849},{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.491240918636322},{"id":"https://openalex.org/C2779818221","wikidata":"https://www.wikidata.org/wiki/Q837330","display_name":"Bytecode","level":3,"score":0.42247462272644043},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3675987720489502},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3502280116081238},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.29107651114463806},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.21639597415924072},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3548606.3559386","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3548606.3559386","pdf_url":null,"source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5299999713897705,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W2028722148","https://openalex.org/W2091939272","https://openalex.org/W2123442489","https://openalex.org/W2132574561","https://openalex.org/W2150656895","https://openalex.org/W2180970301","https://openalex.org/W2250861254","https://openalex.org/W2576376563","https://openalex.org/W2759083144","https://openalex.org/W2884769489","https://openalex.org/W2964241064","https://openalex.org/W2977770803","https://openalex.org/W2983277367","https://openalex.org/W3113108440","https://openalex.org/W3137248741","https://openalex.org/W3156273683","https://openalex.org/W3164551084","https://openalex.org/W3170245351","https://openalex.org/W3186102200","https://openalex.org/W4289038676"],"related_works":["https://openalex.org/W2511770387","https://openalex.org/W3111743984","https://openalex.org/W4312439535","https://openalex.org/W4378976979","https://openalex.org/W3118666763","https://openalex.org/W3037057426","https://openalex.org/W4362015489","https://openalex.org/W4378373752","https://openalex.org/W4294658816","https://openalex.org/W2354251310"],"abstract_inverted_index":{"Emulating":[0],"firmware":[1,34,108,174],"of":[2,10,86,141],"microcontrollers":[3],"is":[4,30],"challenging":[5],"due":[6],"to":[7,18,20,41,128,165,212,229],"the":[8,26,33,43,67,131,138,142,190,219],"lack":[9],"peripheral":[11,21,64,68,74,104],"models.":[12],"Existing":[13],"work":[14],"finds":[15],"out":[16],"how":[17],"respond":[19],"read":[22],"operations":[23],"by":[24,233],"analyzing":[25],"target":[27],"firmware.":[28],"This":[29,134],"problematic":[31,143],"because":[32],"sometimes":[35],"does":[36],"not":[37,115],"contain":[38],"enough":[39],"clues":[40],"support":[42],"emulation":[44],"or":[45,118],"even":[46,119],"contains":[47],"misleading":[48],"information":[49],"(e.g.,":[50],"a":[51,59,84,103,161,172,207],"buggy":[52],"firmware).":[53],"In":[54],"this":[55],"work,":[56],"we":[57,72,99,226],"propose":[58,124],"new":[60,162,208],"approach":[61],"that":[62,177],"builds":[63],"models":[65],"from":[66,189],"specification.":[69,220],"Using":[70,160],"NLP,":[71],"translate":[73],"behaviors":[75],"in":[76,80,137,200],"human":[77],"language":[78],"(documented":[79],"chip":[81,158],"manuals)":[82],"into":[83],"set":[85],"structured":[87],"condition-action":[88,112],"rules.":[89,144],"By":[90],"checking,":[91],"executing,":[92],"and":[93],"chaining":[94],"them":[95],"at":[96],"run":[97],"time,":[98],"can":[100],"dynamically":[101],"synthesize":[102],"model":[105],"for":[106,150],"each":[107],"execution.":[109],"The":[110],"extracted":[111],"rules":[113],"might":[114],"be":[116,120,230],"complete":[117],"wrong.":[121],"We,":[122],"therefore,":[123],"incorporating":[125],"symbolic":[126],"execution":[127],"quickly":[129],"pinpoint":[130],"root":[132],"cause.":[133],"assists":[135],"us":[136],"manual":[139],"correction":[140],"We":[145,204,221],"have":[146],"implemented":[147],"our":[148,169,178,193],"idea":[149],"five":[151],"popular":[152],"MCU":[153],"boards":[154],"spanning":[155],"three":[156],"different":[157],"vendors.":[159],"edit-distance-based":[163],"algorithm":[164],"calculate":[166],"trace":[167],"differences,":[168],"evaluation":[170],"against":[171,218],"large":[173],"corpus":[175],"confirmed":[176,228],"prototype":[179],"achieves":[180],"much":[181],"higher":[182],"fidelity":[183],"compared":[184],"with":[185],"state-of-the-art":[186],"solutions.":[187],"Benefiting":[188],"accurate":[191],"emulation,":[192],"emulator":[194],"effectively":[195],"avoids":[196],"false":[197],"positives":[198],"observed":[199],"existing":[201],"fuzzing":[202],"work.":[203],"also":[205],"designed":[206],"dynamic":[209],"analysis":[210],"method":[211],"perform":[213],"driver":[214],"code":[215],"compliance":[216],"checks":[217],"found":[222],"some":[223],"non-compliance":[224],"which":[225],"later":[227],"bugs":[231],"caused":[232],"race":[234],"conditions.":[235]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":3}],"updated_date":"2026-02-25T23:00:34.991745","created_date":"2025-10-10T00:00:00"}
