1. Chen, D.D., Egele, M., Woo, M., Brumley, D., 2016. Towards Automated Dynamic Analysis for Linux-Based Embedded Firmware. In: Network and Distributed System Security Symposium. NDSS’16, pp. 1–16.
2. IoTCID: A dynamic detection technology for command injection vulnerabilities in IoT devices;Chen;Int. J. Adv. Comput. Sci. Appl. (IJACSA),2022
3. Chen, L., Wang, Y., Cai, Q., Zhan, Y., Hu, H., Linghu, J., Hou, Q., Zhang, C., Duan, H., Xue, Z., 2021. Sharing More and Checking Less: Leveraging Common Input Keywords to Detect Bugs in Embedded Systems. In: USENIX Security Symposium. USENIX Security, pp. 303–319.
4. Cheng, K., Li, Q., Wang, L., Chen, Q., Zheng, Y., Sun, L., Liang, Z., 2018. DTaint: Detecting the Taint-Style Vulnerability in Embedded Device Firmware. In: Annual IEEE/IFIP International Conference on Dependable Systems and Networks. DSN’18, pp. 430–441.
5. Cheng, K., Zheng, Y., Liu, T., Guan, L., Liu, P., Li, H., Zhu, H., Ye, K., Sun, L., 2023. Detecting Vulnerabilities in Linux-Based Embedded Firmware with SSE-Based On-Demand Alias Analysis. In: ACM SIGSOFT International Symposium on Software Testing and Analysis. ISSTA’23, pp. 360–372.