Leveraging Firmware Reverse Engineering for Stealthy Sensor Attacks via Binary Modification.
Sutej KulkarniRyan Tsang AsmitaHouman HomayounSoheil SalehiPublished in: ICCD (2023)
Keyphrases
- reverse engineering
- malicious code
- software engineering
- object oriented
- software maintenance
- operating system
- dynamic analysis
- program understanding
- gene regulatory networks
- sensor networks
- sensor data
- computer aided design
- power consumption
- business rules
- intrusion detection and prevention
- computer systems
- security mechanisms
- software product
- reverse engineer
- legacy systems
- platform independent
- conceptual schema
- data mining
- database design
- software evolution
- case study
- feature selection
- genetic regulatory networks
- program slicing
- databases