{"id":"https://openalex.org/W4383221439","doi":"https://doi.org/10.1145/3579856.3582840","title":"Ember-IO: Effective Firmware Fuzzing with Model-Free Memory Mapped IO","display_name":"Ember-IO: Effective Firmware Fuzzing with Model-Free Memory Mapped IO","publication_year":2023,"publication_date":"2023-07-05","ids":{"openalex":"https://openalex.org/W4383221439","doi":"https://doi.org/10.1145/3579856.3582840"},"language":"en","primary_location":{"id":"doi:10.1145/3579856.3582840","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3579856.3582840","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024705956","display_name":"Guy Farrelly","orcid":"https://orcid.org/0000-0001-9118-0737"},"institutions":[{"id":"https://openalex.org/I5681781","display_name":"The University of Adelaide","ror":"https://ror.org/00892tw58","country_code":"AU","type":"education","lineage":["https://openalex.org/I5681781"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Guy Farrelly","raw_affiliation_strings":["The University of Adelaide, Australia"],"raw_orcid":"https://orcid.org/0000-0001-9118-0737","affiliations":[{"raw_affiliation_string":"The University of Adelaide, Australia","institution_ids":["https://openalex.org/I5681781"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102979686","display_name":"Michael Chesser","orcid":"https://orcid.org/0000-0002-5884-8237"},"institutions":[{"id":"https://openalex.org/I5681781","display_name":"The University of Adelaide","ror":"https://ror.org/00892tw58","country_code":"AU","type":"education","lineage":["https://openalex.org/I5681781"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Michael Chesser","raw_affiliation_strings":["The University of Adelaide, Australia"],"raw_orcid":"https://orcid.org/0000-0002-5884-8237","affiliations":[{"raw_affiliation_string":"The University of Adelaide, Australia","institution_ids":["https://openalex.org/I5681781"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048703299","display_name":"Damith C. Ranasinghe","orcid":"https://orcid.org/0000-0002-2008-9255"},"institutions":[{"id":"https://openalex.org/I5681781","display_name":"The University of Adelaide","ror":"https://ror.org/00892tw58","country_code":"AU","type":"education","lineage":["https://openalex.org/I5681781"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Damith C. Ranasinghe","raw_affiliation_strings":["The University of Adelaide, Australia"],"raw_orcid":"https://orcid.org/0000-0002-2008-9255","affiliations":[{"raw_affiliation_string":"The University of Adelaide, Australia","institution_ids":["https://openalex.org/I5681781"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5024705956"],"corresponding_institution_ids":["https://openalex.org/I5681781"],"apc_list":null,"apc_paid":null,"fwci":1.7004,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.89658003,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"401","last_page":"414"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10904","display_name":"Embedded Systems Design Techniques","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.9951567649841309},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8594681024551392},{"id":"https://openalex.org/keywords/firmware","display_name":"Firmware","score":0.8079826831817627},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.559918999671936},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.49533596634864807},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.48851144313812256},{"id":"https://openalex.org/keywords/code-coverage","display_name":"Code coverage","score":0.439230740070343},{"id":"https://openalex.org/keywords/taint-checking","display_name":"Taint checking","score":0.4354192018508911},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4308450520038605},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4281442165374756},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.39210838079452515},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.31871598958969116}],"concepts":[{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.9951567649841309},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8594681024551392},{"id":"https://openalex.org/C67212190","wikidata":"https://www.wikidata.org/wiki/Q104851","display_name":"Firmware","level":2,"score":0.8079826831817627},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.559918999671936},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.49533596634864807},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.48851144313812256},{"id":"https://openalex.org/C53942775","wikidata":"https://www.wikidata.org/wiki/Q1211721","display_name":"Code coverage","level":3,"score":0.439230740070343},{"id":"https://openalex.org/C63116202","wikidata":"https://www.wikidata.org/wiki/Q7676227","display_name":"Taint checking","level":3,"score":0.4354192018508911},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4308450520038605},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4281442165374756},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.39210838079452515},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.31871598958969116},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3579856.3582840","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3579856.3582840","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/8","score":0.4099999964237213,"display_name":"Decent work and economic growth"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W2774510177","https://openalex.org/W2884769489","https://openalex.org/W3024280588","https://openalex.org/W3103619372","https://openalex.org/W3113108440","https://openalex.org/W4205596332","https://openalex.org/W4285490418","https://openalex.org/W4289038676"],"related_works":["https://openalex.org/W4378373752","https://openalex.org/W2179304688","https://openalex.org/W2008592783","https://openalex.org/W2159690530","https://openalex.org/W2004278744","https://openalex.org/W2107510936","https://openalex.org/W2027779752","https://openalex.org/W4283736421","https://openalex.org/W2384504389","https://openalex.org/W2760842181"],"abstract_inverted_index":{"Exponential":[0],"growth":[1],"in":[2,28,53,68,112],"embedded":[3,76],"systems":[4,77],"is":[5,39,78],"driving":[6],"the":[7,40,45,91,95],"research":[8],"imperative":[9],"to":[10,13,17,42,89,98,106,116],"develop":[11],"fuzzers":[12],"automate":[14],"firmware":[15],"testing":[16,56],"uncover":[18],"software":[19],"bugs":[20],"and":[21,47,80,82,105],"security":[22],"vulnerabilities.":[23],"But,":[24],"employing":[25],"fuzzing":[26,59,72],"techniques":[27],"this":[29],"context":[30],"present":[31],"a":[32,36,114],"uniquely":[33],"challenging":[34],"proposition;":[35],"key":[37],"problem":[38],"need":[41],"deal":[43],"with":[44],"diverse":[46],"large":[48],"number":[49],"of":[50,86],"peripheral":[51,103],"communications":[52],"an":[54,69],"automated":[55],"framework.":[57],"Recent":[58],"approaches:":[60],"i)":[61],"employ":[62],"re-hosting":[63],"methods":[64],"by":[65,94,102],"executing":[66],"code":[67],"emulator":[70],"because":[71],"on":[73],"resource":[74],"limited":[75],"slow":[79],"unscalable;":[81],"ii)":[83],"integrate":[84],"models":[85],"hardware":[87],"behaviour":[88],"overcome":[90],"challenges":[92],"faced":[93],"massive":[96],"input-space":[97],"be":[99],"explored":[100],"created":[101],"devices":[104],"generate":[107],"inputs":[108],"that":[109],"are":[110],"effective":[111],"aiding":[113],"fuzzer":[115],"make":[117],"progress.":[118]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
