Towards Automated Exploit Generation for Embedded Systems

Matthew Ruffell, Jin B. Hong, Hyoungshick Kim, Dong Seong Kim. Towards Automated Exploit Generation for Embedded Systems. In Dooho Choi, Sylvain Guilley, editors, Information Security Applications - 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers. Volume 10144 of Lecture Notes in Computer Science, pages 161-173, 2016. [doi]

@inproceedings{RuffellHKK16,
  title = {Towards Automated Exploit Generation for Embedded Systems},
  author = {Matthew Ruffell and Jin B. Hong and Hyoungshick Kim and Dong Seong Kim},
  year = {2016},
  doi = {10.1007/978-3-319-56549-1_14},
  url = {http://dx.doi.org/10.1007/978-3-319-56549-1_14},
  researchr = {https://researchr.org/publication/RuffellHKK16},
  cites = {0},
  citedby = {0},
  pages = {161-173},
  booktitle = {Information Security Applications - 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  editor = {Dooho Choi and Sylvain Guilley},
  volume = {10144},
  series = {Lecture Notes in Computer Science},
  isbn = {978-3-319-56549-1},
}