Dynamic analysis of firmware components in IoT devices
SecureList
JULY 6, 2022
As a rule, this means that the source code of the device’s firmware is unavailable and all the researcher can use is the user manual and a few threads on some user forum discussing the device’s operation. The vulnerability assessment of IoT/IIoT devices is based on analyzing their firmware.
Let's personalize your content