Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Firmware

Known as: Flashing, BadUSB, Flashing (technology) 
In electronic systems and computing, firmware is a type of software that provides control, monitoring and data manipulation of engineered products… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
The current power grid is no longer a feasible solution due to ever-increasing user demand of electricity, old infrastructure… Expand
  • figure 1
  • table II
  • table I
  • table III
  • table IV
Is this relevant?
Highly Cited
2016
Highly Cited
2016
Embedded devices are going to be used extremely in Internet of Things (IoT) environments. The small and tiny IoT devices will… Expand
  • table 1
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2016
Highly Cited
2016
Commercial-off-the-shelf (COTS) network-enabled embedded devices are usually controlled by vendor firmware to perform integral… Expand
  • figure 1
  • table I
  • table II
  • table III
  • table IV
Is this relevant?
Highly Cited
2015
Highly Cited
2015
Embedded devices have become ubiquitous, and they are used in a range of privacy-sensitive and security-critical applications… Expand
  • table I
  • figure 1
  • table II
  • table III
  • table IV
Is this relevant?
Highly Cited
2013
Highly Cited
2013
Abstract Recent attacks on industrial control systems, such as the highly publicized Stuxnet malware, have intensified a “race to… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2013
Highly Cited
2013
The ability to update firmware is a feature that is found in nearly all modern embedded systems. We demonstrate how this feature… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2013
Highly Cited
2013
Embedded systems increasingly use software-driven low-power microprocessors for security-critical settings, surfacing a need for… Expand
  • figure 1
  • table 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Recent research demonstrates that malware can infect peripherals' firmware in a typical x86 computer system, e.g., by exploiting… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Modern intelligent vehicles have electronic control units containing firmware that enables various functions in the vehicle. New… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
1995
Highly Cited
1995
Abstract : This standard specifies a Secure Hash Algorithm (SHA-1) which can be used to generate a condensed representation of a… Expand
  • figure 1
Is this relevant?