Explore the security analysis of dynamic allocators in monolithic firmware images through this 19-minute IEEE conference talk. Dive into the research scope, identification of basic functions and pointer sources, and the process of identifying malloc. Examine the evaluation methods, including HML security testing and its results. Learn from a hardware example and gain valuable takeaways on the security implications of dynamic allocators in firmware.
Heapster- Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images