1. Yan, S., Wang, R., Hauser, C., Kruegel, C., Vigna, G.: Firmalice – automatic detection of authentication bypass vulnerabilities in binary firmware. In: Network and Distributed System Security Symposium, Network and Distributed System Security Symposium (2015)
2. Giese, D., Wegemer, D.: Reversing iot: Xiaomi ecosystem (2018)
3. Schiller, N., et al.: Drone security and the mysterious case of DJI’s DroneID. In: Network and Distributed System Security Symposium (NDSS) (2023)
4. Melotti, D., Bellom, M.R.: Attack on titan m, reloaded: vulnerability research on a modern security chip. In: blackhat USA 2022, blackhat USA 2022, Las Vegas, USA (2022)
5. Eagle, C.: The IDA pro book: the unofficial guide to the world’s most popular disassembler, No Starch Press (2008)