From fdc4149487e7aac9b7ce5f647eefc08888fd4430 Mon Sep 17 00:00:00 2001 From: 0xricksanchez Date: Tue, 5 May 2020 13:37:51 +0200 Subject: [PATCH] -\n --- readme.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/readme.md b/readme.md index 08bf042..5859f36 100644 --- a/readme.md +++ b/readme.md @@ -158,8 +158,7 @@ Software tools for analyzing embedded/IoT devices and firmware. - 2015, Papp et al: [Embedded Systems Security: Threats, Vulnerabilities, and Attack Taxonomy](http://www.cse.psu.edu/~pdm12/cse597g-f15/readings/cse597g-embedded_systems.pdf) - 2014, Zaddach et al: [Avatar: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares](http://www.eurecom.fr/en/publication/4158/download/rs-publi-4158.pdf) - 2014, Alimi et al: [Analysis of embedded applications by evolutionary fuzzing](http://ieeexplore.ieee.org/document/6903734/) -- 2014, Costin et al: [A Large-Scale Analysis of the Security of Embedded Firmware - s](http://www.s3.eurecom.fr/docs/usenixsec14_costin.pdf) +- 2014, Costin et al: [A Large-Scale Analysis of the Security of Embedded Firmwares](http://www.s3.eurecom.fr/docs/usenixsec14_costin.pdf) - 2013, Davidson et al: [FIE on Firmware: Finding Vulnerabilities in Embedded Systems using Symbolic Execution](https://www.usenix.org/system/files/conference/usenixsecurity13/sec13-paper_davidson.pdf) ## Case Studies