{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:11:11Z","timestamp":1767337871397,"version":"3.37.3"},"reference-count":11,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,2]],"date-time":"2023-10-02T00:00:00Z","timestamp":1696204800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,2]],"date-time":"2023-10-02T00:00:00Z","timestamp":1696204800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,2]]},"DOI":"10.1109\/cns59707.2023.10289061","type":"proceedings-article","created":{"date-parts":[[2023,10,27]],"date-time":"2023-10-27T17:47:13Z","timestamp":1698428833000},"page":"1-9","source":"Crossref","is-referenced-by-count":1,"title":["MMIO Access-Based Coverage for Firmware Analysis"],"prefix":"10.1109","author":[{"given":"Ken Yihang","family":"Bai","sequence":"first","affiliation":[{"name":"University of Florida"}]},{"given":"Tuba","family":"Yavuz","sequence":"additional","affiliation":[{"name":"University of Florida"}]}],"member":"263","reference":[{"volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Zhou","article-title":"Automatic firmware emulation through invalidity-guided knowledge inference","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/2892208.2892235"},{"article-title":"Amazon freertos","key":"ref3"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2016.23415","article-title":"Towards automated dynamic analysis for linux-based embedded firmware","volume-title":"23rd Annual Network and Distributed System Security Symposium, NDSS 2016","author":"Chen"},{"key":"ref5","first-page":"135","article-title":"Toward the analysis of embedded firmware through automated re-hosting","volume-title":"22nd International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2019","author":"Gustafson"},{"key":"ref6","first-page":"1201","article-title":"Halucinator: Firmware re-hosting through abstraction layer emulation","volume-title":"29th USENIX Security Symposium, USENIX Security 2020, August 12-14, 2020","author":"Clements"},{"key":"ref7","first-page":"1237","article-title":"P2IM: scalable and hardware-independent firmware testing via automatic peripheral interface modeling","volume-title":"29th USENIX Security Symposium, USENIX Security 2020, August 12-14, 2020","author":"Feng"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/SP40001.2021.00018"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/3427228.3427280"},{"volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Johnson","article-title":"Jetset: Targeted firmware rehosting for embedded systems","key":"ref10"},{"key":"ref11","first-page":"1239","article-title":"Fuzzware: Using precise MMIO modeling for effective firmware fuzzing","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Scharnowski"}],"event":{"name":"2023 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2023,10,2]]},"location":"Orlando, FL, USA","end":{"date-parts":[[2023,10,5]]}},"container-title":["2023 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10288629\/10288642\/10289061.pdf?arnumber=10289061","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T10:10:05Z","timestamp":1709374205000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10289061\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,2]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/cns59707.2023.10289061","relation":{},"subject":[],"published":{"date-parts":[[2023,10,2]]}}}