{"id":"https://openalex.org/W7128479907","doi":"https://doi.org/10.48550/arxiv.2602.08750","title":"DyMA-Fuzz: Dynamic Direct Memory Access Abstraction for Re-hosted Monolithic Firmware Fuzzing","display_name":"DyMA-Fuzz: Dynamic Direct Memory Access Abstraction for Re-hosted Monolithic Firmware Fuzzing","publication_year":2026,"publication_date":"2026-02-09","ids":{"openalex":"https://openalex.org/W7128479907","doi":"https://doi.org/10.48550/arxiv.2602.08750"},"language":null,"primary_location":{"id":"pmh:doi:10.48550/arxiv.2602.08750","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024705956","display_name":"Guy Farrelly","orcid":"https://orcid.org/0000-0001-9118-0737"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Farrelly, Guy","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102979686","display_name":"Michael Chesser","orcid":"https://orcid.org/0000-0002-5884-8237"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chesser, Michael","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125495767","display_name":"Seyit Camtepe","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Camtepe, Seyit","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5125530430","display_name":"Damith C. Ranasinghe","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ranasinghe, Damith C.","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5024705956"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.753000020980835,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.753000020980835,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.044599998742341995,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10933","display_name":"Real-Time Systems Scheduling","score":0.03629999980330467,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.9901000261306763},{"id":"https://openalex.org/keywords/firmware","display_name":"Firmware","score":0.9502999782562256},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.550000011920929},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.47620001435279846},{"id":"https://openalex.org/keywords/abstraction","display_name":"Abstraction","score":0.4348999857902527},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.42660000920295715},{"id":"https://openalex.org/keywords/interface","display_name":"Interface (matter)","score":0.38760000467300415}],"concepts":[{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.9901000261306763},{"id":"https://openalex.org/C67212190","wikidata":"https://www.wikidata.org/wiki/Q104851","display_name":"Firmware","level":2,"score":0.9502999782562256},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8241000175476074},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.550000011920929},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5321000218391418},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.47620001435279846},{"id":"https://openalex.org/C124304363","wikidata":"https://www.wikidata.org/wiki/Q673661","display_name":"Abstraction","level":2,"score":0.4348999857902527},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.42660000920295715},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.39800000190734863},{"id":"https://openalex.org/C113843644","wikidata":"https://www.wikidata.org/wiki/Q901882","display_name":"Interface (matter)","level":4,"score":0.38760000467300415},{"id":"https://openalex.org/C53942775","wikidata":"https://www.wikidata.org/wiki/Q1211721","display_name":"Code coverage","level":3,"score":0.31859999895095825},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.31790000200271606},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.31450000405311584},{"id":"https://openalex.org/C22927095","wikidata":"https://www.wikidata.org/wiki/Q1784206","display_name":"Stateful firewall","level":3,"score":0.3027999997138977},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.289900004863739},{"id":"https://openalex.org/C63116202","wikidata":"https://www.wikidata.org/wiki/Q7676227","display_name":"Taint checking","level":3,"score":0.27730000019073486},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.2766999900341034},{"id":"https://openalex.org/C147358964","wikidata":"https://www.wikidata.org/wiki/Q1200992","display_name":"Abstraction layer","level":3,"score":0.2667999863624573},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.2526000142097473}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:doi:10.48550/arxiv.2602.08750","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},{"id":"doi:10.48550/arxiv.2602.08750","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.08750","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:doi:10.48550/arxiv.2602.08750","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"sustainable_development_goals":[{"score":0.43914878368377686,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0],"rise":[1],"of":[2,36],"smart":[3],"devices":[4],"in":[5,16,49,80,88,163],"critical":[6],"domains--including":[7],"automotive,":[8],"medical,":[9],"industrial--demands":[10],"robust":[11],"firmware":[12,15,128,165],"testing.":[13],"Fuzzing":[14],"re-hosted":[17,89],"environments":[18],"is":[19],"a":[20,39,64,158,168],"promising":[21],"method":[22],"for":[23,52,171],"automated":[24,164],"testing":[25,166],"at":[26],"scale,":[27],"but":[28,57],"remains":[29],"difficult":[30],"due":[31],"to":[32,76,85,106,148],"the":[33,71],"tight":[34],"coupling":[35],"code":[37,151],"with":[38],"microcontroller's":[40],"peripherals.":[41],"Existing":[42],"fuzzing":[43,115,172],"frameworks":[44],"primarily":[45],"address":[46],"input":[47,83],"challenges":[48],"providing":[50],"inputs":[51],"Memory-Mapped":[53],"I/O":[54],"or":[55,123],"interrupts,":[56],"largely":[58],"overlook":[59],"Direct":[60],"Memory":[61],"Access":[62],"(DMA),":[63],"key":[65,93],"high-throughput":[66],"interface":[67],"used":[68],"that":[69],"bypasses":[70],"CPU.":[72],"We":[73],"introduce":[74],"DyMA-Fuzz":[75,135,156],"extend":[77],"recent":[78],"advances":[79],"stream-based":[81],"fuzz":[82],"injection":[84],"DMA-driven":[86],"interfaces":[87],"environments.":[90],"It":[91],"tackles":[92],"challenges--vendor-specific":[94],"descriptors,":[95],"heterogeneous":[96],"DMA":[97,108],"designs,":[98],"and":[99,112,130,138,145,160,167],"varying":[100],"descriptor":[101],"locations--using":[102],"runtime":[103],"analysis":[104],"techniques":[105],"infer":[107],"memory":[109],"access":[110],"patterns":[111],"automatically":[113],"inject":[114],"data":[116],"into":[117],"target":[118],"buffers,":[119],"without":[120],"manual":[121],"configuration":[122],"datasheets.":[124],"Evaluated":[125],"on":[126],"94":[127],"samples":[129],"8":[131],"DMA-guarded":[132],"CVE":[133],"benchmarks,":[134],"reveals":[136],"vulnerabilities":[137],"execution":[139],"paths":[140],"missed":[141],"by":[142],"state-of-the-art":[143],"tools":[144],"achieves":[146],"up":[147],"122%":[149],"higher":[150],"coverage.":[152],"These":[153],"results":[154],"highlight":[155],"as":[157],"practical":[159],"effective":[161],"advancement":[162],"scalable":[169],"solution":[170],"complex":[173],"embedded":[174],"systems.":[175]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2026-02-11T00:00:00"}
