{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:24:14Z","timestamp":1759335854178,"version":"3.37.3"},"reference-count":15,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1540217; CNS-1526718; CNS-1564140; CNS-1617474; CNS-1815883"],"award-info":[{"award-number":["CNS-1540217; CNS-1526718; CNS-1564140; CNS-1617474; CNS-1815883"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Secur. Privacy"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1109\/msec.2019.2926462","type":"journal-article","created":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T00:20:02Z","timestamp":1565050802000},"page":"38-46","source":"Crossref","is-referenced-by-count":7,"title":["Toward Automated Firmware Analysis in the IoT Era"],"prefix":"10.1109","volume":"17","author":[{"given":"Grant","family":"Hernandez","sequence":"first","affiliation":[{"name":"Computer and Information Science and Engineering, University of Florida, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3575-3067","authenticated-orcid":false,"given":"Farhaan","family":"Fowze","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, University of Florida, United States"}]},{"given":"Dave Jing","family":"Tian","sequence":"additional","affiliation":[{"name":"Purdue University, United States"}]},{"given":"Tuba","family":"Yavuz","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, University of Florida, United States"}]},{"given":"Patrick","family":"Traynor","sequence":"additional","affiliation":[{"name":"Computer and Information Science and Engineering, University of Florida, United States"}]},{"given":"Kevin R.B.","family":"Butler","sequence":"additional","affiliation":[{"name":"Computer Science, University of Florida, United States"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23294"},{"journal-title":"BadUSB-on accessories that turn evil","year":"2014","author":"nohl","key":"ref12"},{"key":"ref15","first-page":"273","article-title":"ATtention spanned: Comprehensive vulnerability analysis of AT commands within the Android ecosystem","author":"j tian","year":"0","journal-title":"Proc 27th USENIX Security Symp (USENIX Security 18)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2018.23017"},{"journal-title":"State of the IoT 2018 Number of IoT devices now at 7B&#x2014;Market accelerating","year":"2018","author":"k l","key":"ref10"},{"key":"ref2","first-page":"1092","article-title":"Understanding the Mirai botnet","author":"antonakakis","year":"0","journal-title":"Proc 26th USENIX Security Symp (USENIX Security 17)"},{"journal-title":"Hackers remotely kill a jeep on the highway&#x2014;with me in it","year":"2015","author":"greenberg","key":"ref1"},{"journal-title":"Researching Android Device Security with the Help of a Droid Army","year":"2014","author":"drake","key":"ref8"},{"key":"ref7","first-page":"463","article-title":"FIE on firmware: Finding vulnerabilities in embedded systems using symbolic execution","author":"davidson","year":"0","journal-title":"Proc 22nd USENIX Security Symp (USENIX Security 13)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134050"},{"journal-title":"Bleeding Bit","year":"2018","key":"ref4"},{"journal-title":"BlueBorne","year":"2017","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1961296.1950396"},{"key":"ref5","first-page":"46","article-title":"QEMU, a fast and portable dynamic translator","author":"bellard","year":"0","journal-title":"Proc USENIX Annu Technical Conf Freenix Track"}],"container-title":["IEEE Security &amp; Privacy"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/8013\/8821441\/8787829-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8013\/8821441\/08787829.pdf?arnumber=8787829","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,2]],"date-time":"2023-05-02T22:11:59Z","timestamp":1683065519000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8787829\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":15,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/msec.2019.2926462","relation":{},"ISSN":["1540-7993","1558-4046"],"issn-type":[{"type":"print","value":"1540-7993"},{"type":"electronic","value":"1558-4046"}],"subject":[],"published":{"date-parts":[[2019,9]]}}}