To see the other types of publications on this topic, follow the link: Testing Firmware.

Journal articles on the topic 'Testing Firmware'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Testing Firmware.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Soujanya, Reddy Annapareddy. "Testing Strategies for Ensuring Firmware Integrity and Resilience in Critical Devices." Journal of Advances in Developmental Research 13, no. 1 (2022): 1–5. https://doi.org/10.5281/zenodo.14615738.

Full text
Abstract:
The integrity and resilience of firmware in critical devices are paramount to ensuring their reliable operation, especially in sectors such as healthcare, transportation, and industrial automation. This paper explores advanced testing strategies to detect vulnerabilities, validate robustness, and ensure firmware security against malicious attacks and operational failures. Key methodologies discussed include static and dynamic analysis, fuzz testing, and formal verification techniques. The integration of automated testing frameworks, continuous monitoring, and adherence to secure development li
APA, Harvard, Vancouver, ISO, and other styles
2

Soujanya, Reddy Annapareddy. "Improving Firmware Reliability through Robust Version Control and Continuous Integration." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 9, no. 3 (2023): 1–6. https://doi.org/10.5281/zenodo.14631912.

Full text
Abstract:
Firmware reliability is a critical factor in the functionality and longevity of modern embedded systems. This paper explores strategies to enhance firmware reliability by leveraging robust version control systems (VCS) and continuous integration (CI) practices. Version control enables effective collaboration, change tracking, and rollback mechanisms, while CI ensures automated testing and validation at every stage of development. Together, these methodologies minimize errors, reduce regressions, and accelerate the delivery of stable firmware updates. We discuss best practices for implementing
APA, Harvard, Vancouver, ISO, and other styles
3

Patil, Sonali. "Harbinger: A Toolkit for Vulnerability Testing of IoT Devices and Web Clients." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 6647–53. http://dx.doi.org/10.22214/ijraset.2023.52962.

Full text
Abstract:
Abstract: The need for efficient tools to identify and mitigate vulnerabilities has never been more critical due to the complexity and proliferation of online applications and embedded systems. We introduce a Python toolkit in this study that combines a variety of security testing and analysis methodologies, allowing users to locate and fix web application vulnerabilities and examine firmware files. Our toolkit offers aggregated reports summarizing the outcomes of firmware analysis and web application vulnerability testing, in addition to being adaptable and user-friendly so customers may chan
APA, Harvard, Vancouver, ISO, and other styles
4

Annapareddy, Soujanya Reddy. "Advancements in Firmware Testing and Validation Techniques." ESP Journal of Engineering & Technology Advancements 4, no. 3 (2024): 142–50. https://doi.org/10.56472/25832646/jeta-v4i3p114.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Omkar, Manohar Ghag. "Firmware Test Automation using Open-Source Tools." Journal of Scientific and Engineering Research 5, no. 3 (2018): 498–502. https://doi.org/10.5281/zenodo.10902903.

Full text
Abstract:
<strong>Abstract </strong>Python boasts a robust testing community and offers exceptional built-in testing capabilities within its standard library. The Python environment includes a wide range of testing tools. Pytest is notable for its user-friendly interface and ability to handle increasingly complex testing requirements. This paper presents a procedural method of how firmware testing can occur and how this testing promotes quality software. The open-source tool selected for this paper is Pytest, a Python-based tool. Python performs several functions in the automated testing procedures. The
APA, Harvard, Vancouver, ISO, and other styles
6

Guduru, Sandhya. "IoT Firmware Security Automation: QEMU-Based Fuzzing, CVSS Scoring, and Mender OTA Updates." Journal of Mathematical & Computer Applications 2, no. 4 (2023): 1–5. https://doi.org/10.47363/jmca/2023(2)205.

Full text
Abstract:
Firmware security is a growing concern in IoT environments, as many devices are shipped with outdated or vulnerable software. Traditional security methods, such as manual testing and patching, are time-consuming and ineffective against the increasing complexity of firmware architectures.
APA, Harvard, Vancouver, ISO, and other styles
7

Soujanya, Reddy Annapareddy. "Real-World Applications of Python in Firmware and Software Automation." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 10, no. 2 (2024): 1–6. https://doi.org/10.5281/zenodo.14540900.

Full text
Abstract:
Python has become a versatile tool in firmware and software automation, enabling efficient development and testing workflows across various industries. Its simplicity, extensive libraries, and cross-platform support make it ideal for automating tasks like firmware flashing, version verification, and hardware communication. This paper explores real-world applications of Python in firmware and software automation, including integrating serial communication protocols, streamlining build and deployment processes, and implementing test frameworks for embedded systems. It highlights how Python's eco
APA, Harvard, Vancouver, ISO, and other styles
8

Kagita, Mohan Krishna, and Giridhar Reddy Bojja. "A framework for intelligent IoT firmware compliance testing." Internet of Things and Cyber-Physical Systems 1 (2021): 1–7. http://dx.doi.org/10.1016/j.iotcps.2021.07.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pratama, Yogi, and Rum Mohamad Andri K. Rasyid. "PERBANDINGAN KUALITAS LAYANAN KINERJA PERANGKAT JARINGAN TP-LINK WIRELESS N ROUTER DAN GL- INET WIRELESS ROUTER BERBASIS FIRMWARE OPENWRT." Journal of Information System Management (JOISM) 4, no. 1 (2022): 1–7. http://dx.doi.org/10.24076/joism.2022v4i1.760.

Full text
Abstract:
The development of the internet network and network equipment is currently very rapid, to meet the needs of internet usage, network devices are used as supporting tools in service access and network deployment. According to research conducted in a performance comparison analysis between the default firmware and the openwrt firmware [1], the performance of the network device is not only determined by the hardware specifications contained in the network device, but is also determined by the firmware in the network device. according to a literature review from various sources that the openwrt fir
APA, Harvard, Vancouver, ISO, and other styles
10

Zhou, Wei, Shandian Shen, and Peng Liu. "IoT Firmware Emulation and Its Security Application in Fuzzing: A Critical Revisit." Future Internet 17, no. 1 (2025): 19. https://doi.org/10.3390/fi17010019.

Full text
Abstract:
As IoT devices with microcontroller (MCU)-based firmware become more common in our lives, memory corruption vulnerabilities in their firmware are increasingly targeted by adversaries. Fuzzing is a powerful method for detecting these vulnerabilities, but it poses unique challenges when applied to IoT devices. Direct fuzzing on these devices is inefficient, and recent efforts have shifted towards creating emulation environments for dynamic firmware testing. However, unlike traditional software, firmware interactions with peripherals that are significantly more diverse presents new challenges for
APA, Harvard, Vancouver, ISO, and other styles
11

Wang, Yunzhi, and Yufeng Li. "DCGFuzz: An Embedded Firmware Security Analysis Method with Dynamically Co-Directional Guidance Fuzzing." Electronics 13, no. 8 (2024): 1433. http://dx.doi.org/10.3390/electronics13081433.

Full text
Abstract:
Microcontroller Units (MCUs) play a vital role in embedded devices due to their energy efficiency and scalability. The firmware in MCUs contains vulnerabilities that can lead to digital and physical harm. However, testing MCU firmware faces challenges due to various tool limitations and unavailable firmware details. To address this problem, research is turning to fuzzing and rehosting. Due to the inherent imbalance in computational resources of the fuzzing algorithm and the lack of consideration for the computational resource requirements of rehosting methods, some hardware behavior-related pa
APA, Harvard, Vancouver, ISO, and other styles
12

Beaujean, F., T. Romanteau, and J. B. Sauvan. "Automated firmware generation and continuous testing for the CMS HGCAL trigger primitive generator." Journal of Instrumentation 17, no. 03 (2022): C03029. http://dx.doi.org/10.1088/1748-0221/17/03/c03029.

Full text
Abstract:
Abstract The prototype version of the trigger primitive generator firmware for the Phase-2 CMS endcap calorimeter upgrade is being implemented in order to assess the FPGA resource requirements and dimension the system. For the development of some of these blocks, a data-driven design flow based on VHDL and HLS C/C++ templates is used to automate the production of multiple firmware variants. In addition, the design steps are integrated into Gitlab Continuous Integration tools to automatically test and validate every change, and as much as possible avoid repetitive manual tasks and the associate
APA, Harvard, Vancouver, ISO, and other styles
13

Wang, Yibo. "Theoretical Analysis and Countermeasure Strategies for IoT Firmware Vulnerabilities." Applied and Computational Engineering 160, no. 1 (2025): 55–63. https://doi.org/10.54254/2755-2721/2025.tj23490.

Full text
Abstract:
With the widespread adoption of IoT devices, firmware vulnerabilities have emerged as a significant cybersecurity threat. These vulnerabilities can lead to devices being controlled, data breaches, and even physical damage, severely impacting personal privacy and the security of critical infrastructure. This paper aims to provide an in-depth analysis of the formation, detection, assessment, management, and prevention of IoT firmware vulnerabilities, exploring their significance and role. Through a literature review and case studies, combined with techniques such as static analysis, fuzz testing
APA, Harvard, Vancouver, ISO, and other styles
14

Mudarakola, Lakshmi Prasad, and J. K. R. Sastry. "A Neural Network Based Strategy (NNBS) for Automated Construction of Test Cases for Testing an Embedded System using Combinatorial Techniques." International Journal of Engineering & Technology 7, no. 1.3 (2017): 74. http://dx.doi.org/10.14419/ijet.v7i1.3.9271.

Full text
Abstract:
Testing an embedded system is required to locate bugs in software, diminish risk, development, repairs costs and to improve performance for both users and the company. Embedded software testing tools are useful for catching defects during unit, integration and system testing. Embedded systems in many cases must be optimized by engaging crucial areas of the embedded systems considering all factors of the input domain. The most important concern is to build a place of test cases depend on design of the requirements that can recognize more number of faults at a least rate and point in time in the
APA, Harvard, Vancouver, ISO, and other styles
15

Yu, Jihyeon, Juhwan Kim, Youngwoo Lee, Fayozbek Rustamov, and Joobeom Yun. "Adaptive Emulation Framework for Multi-Architecture IoT Firmware Testing." Computers, Materials & Continua 75, no. 2 (2023): 3291–315. http://dx.doi.org/10.32604/cmc.2023.035835.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Dvořáček, Filip. "LABORATORY TESTING OF LEICA AT401 LASER TRACKER." Acta Polytechnica 56, no. 2 (2016): 88. http://dx.doi.org/10.14311/ap.2016.56.0088.

Full text
Abstract:
&lt;p&gt;This paper describes laboratory tests on a Leica AT401laser tracker. As the newer Leica AT402 model also uses the same firmware package, most of the results should also be valid for this device. First, we present the instrument’s firmware errors and the software used for testing. The ASME B89.4.19-2006 standard for testing laser trackers is briefly presented. The warm-up effect of the instrument is inspected with respect to both angle measurement and distance measurement. The absolute distance meter (ADM) is compared with a laboratory interferometer on a 30-meter long rail and also on
APA, Harvard, Vancouver, ISO, and other styles
17

Oh, Insu, Mahdi Sahlabadi, Kangbin Yim, and Sunyoung Lee. "Threat Classification and Vulnerability Analysis on 5G Firmware Over-the-Air Updates for Mobile and Automotive Platforms." Electronics 14, no. 10 (2025): 2034. https://doi.org/10.3390/electronics14102034.

Full text
Abstract:
The integration of 5G technology with existing LTE architectures has facilitated the widespread adoption of firmware over-the-air (FOTA) updates across Android-based devices, including mobile and automotive infotainment systems. While 5G enhances communication speed and convenience, vulnerabilities related to firmware tampering and Man-in-the-Middle (MitM) attacks still present considerable risks. This study analyzes the security of the FOTA update process for six Android-based mobile manufacturers and one vehicle model, all of which utilize LTE architectures within 5G networks. Through compre
APA, Harvard, Vancouver, ISO, and other styles
18

Hristov, Marian, Maria Nenova, and Viktoria Dimitrova. "Security Symmetry in Embedded Systems: Using Microsoft Defender for IoT to Detect Firmware Downgrade Attacks." Symmetry 17, no. 7 (2025): 1061. https://doi.org/10.3390/sym17071061.

Full text
Abstract:
Nowadays, the world witnesses cyber attacks daily, and these threats are becoming exponentially sophisticated due to advances in Artificial Intelligence (AI). This progress allows adversaries to accelerate malware development and streamline the exploitation process. The motives vary, and so do the consequences. Unlike Information Technology (IT) breaches, Operational Technology (OT)—such as manufacturing plants, electric grids, or water and wastewater facilities—compromises can have life-threatening or environmentally hazardous consequences. For that reason, this article explores a potential c
APA, Harvard, Vancouver, ISO, and other styles
19

Bortolato, G., M. Cepeda, J. Heikkilä, et al. "Adaptability and efficiency of the CMS Level-1 Global Trigger firmware implementation for Phase-2." Journal of Instrumentation 19, no. 03 (2024): C03007. http://dx.doi.org/10.1088/1748-0221/19/03/c03007.

Full text
Abstract:
Abstract We present details on the new Level-1 Global Trigger at CMS for the upcoming high-luminosity operation of the LHC. Our focus is on the newly developed firmware, which employs a bottom-up generic approach to enhance menu adaptability and accommodate the increase in upstream data. We also highlight our efficient pipelining strategy that ensures excellent routability at 480 MHz. Furthermore, we discuss the firmware implementation for three prototypes targeting Serenity boards, together with their current and future testing and validation endeavours.
APA, Harvard, Vancouver, ISO, and other styles
20

Wensing, M. "Testing and firmware development for the ATLAS IBL BOC prototype." Journal of Instrumentation 7, no. 12 (2012): C12027. http://dx.doi.org/10.1088/1748-0221/7/12/c12027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Underhill, Paul, Toyosi Oyinloye, Lee Speakman, and Thaddeus Eze. "Forensic Trails Obfuscation and Preservation via Hard Drive Firmware." European Conference on Cyber Warfare and Security 21, no. 1 (2022): 419–28. http://dx.doi.org/10.34190/eccws.21.1.188.

Full text
Abstract:
The hard disk drive stores data the user is creating, modifying, and deleting while a firmware facilitates communication between the drive and the operating system. The firmware tells the device and machine how to communicate with each other and will share useful information such as, disk size and information on any bad sectors. Current research shows that exploits exist that can manipulate these outputs. As an attacker, you can change the size of the disk displayed to the operating system to hide data in, likewise by marking an area of the disk as bad. Users may not be aware of these changes
APA, Harvard, Vancouver, ISO, and other styles
22

Madani, Krisna, Rahmi Hidayati, and Uray Ristian. "Sistem Update Firmware Perangkat IoT Menggunakan Teknik OTA Berbasis HTTP." JURIKOM (Jurnal Riset Komputer) 9, no. 4 (2022): 1160. http://dx.doi.org/10.30865/jurikom.v9i4.4685.

Full text
Abstract:
Firmware is software that resembles an operating system and embedded in the hardware. On Internet of Things (IoT) devices, the already installed firmware will not be updated for the specified time or will not even be updated at all. This is because the firmware is considered a system whose needs and functions do not need to be changed. However, in reality the firmware that is already installed and is being run definitely needs a change. The update process generally also uses conventional methods, namely by connecting devices on a computer using a cable. This method is of course not effective a
APA, Harvard, Vancouver, ISO, and other styles
23

Narukawa, Yoshifumi. "Development of methodology and implementation of SoC-based compact single-board validation system for the ATLAS Phase-II level-0 muon trigger system." Journal of Instrumentation 20, no. 02 (2025): C02023. https://doi.org/10.1088/1748-0221/20/02/c02023.

Full text
Abstract:
Abstract Firmware testing on actual hardware is an optimal way to validate large-scale FPGA-based trigger/DAQ systems. For the Phase-II level-0 muon trigger system at the ATLAS experiment, a methodology using prototype ATCA-based Sector Logic (SL) boards was developed, featuring self-complete DAQ, high-statistics test patterns, and various nature of input test data. The design exploits Zynq SoC on the board for control, injection of BRAM-based test patterns data and flexible DAQ to probe the process. This success is thanks to the flexibility of the SL board design around the SoC device. This m
APA, Harvard, Vancouver, ISO, and other styles
24

Researcher. "ACCELERATING FIRMWARE DEVELOPMENT THROUGH VIRTUAL SIMULATION: A SYSTEMATIC ANALYSIS OF PROTOTYPING METHODOLOGIES." International Journal of Computer Engineering and Technology (IJCET) 15, no. 6 (2024): 430–41. https://doi.org/10.5281/zenodo.14172073.

Full text
Abstract:
This article presents a comprehensive article analysis of simulation-based approaches in modern firmware development and prototyping, examining their impact on development efficiency, cost reduction, and product reliability. Through systematic evaluation of virtual environment implementations across multiple development scenarios, the article demonstrates that simulation-based methodologies reduce development cycle time by an average of 40% while enabling more thorough testing coverage, particularly for edge cases and complex system interactions. The article investigates the integration of adv
APA, Harvard, Vancouver, ISO, and other styles
25

Taufik, Muhammad, Wahyudi Hasbi, and Abdul Karim. "IN-ORBIT IMPLEMENTATION OF ERROR PATCHING METHODS FOR LAPAN-A3/IPB OBDH FIRMWARE SYSTEM." Jurnal Teknologi Dirgantara 17, no. 1 (2019): 11. http://dx.doi.org/10.30536/j.jtd.2019.v17.a3012.

Full text
Abstract:
ABSTRACTOBDH (On-board data handling) is a satellite subsystem that receives, processes, decides and executes commands from and to satellites. OBDH is built on two systems namely hardware and software integrated system (firmware system). In terms of hardware, OBDH uses a processor with 32bit RISC architecture, 128/256 Kbyte internal memory and a firmware system that is built using primitive programming. This programming uses the super loop architecture program and interrupt to manage the system to function properly. Problems occur when an error occurs in one of the functions in the interrupt r
APA, Harvard, Vancouver, ISO, and other styles
26

Dong, Jian Jun, and Tan Sheng Zhou. "Design of Multi-Signal Testing System Based on ARM & FPGA." Applied Mechanics and Materials 182-183 (June 2012): 1215–19. http://dx.doi.org/10.4028/www.scientific.net/amm.182-183.1215.

Full text
Abstract:
This paper presents a multi-signal testing system based on ARM &amp; FPGA, Paper discussed system structure design, including hardware and software design. The hardware uses FPGA to expand ports and USB2.0 interface chip CY7C68013 for signals data transmission; software including system firmware, driver, user applications the three-parts design. The design of the system meet requirements, its high performance, low cost and can be widely used in signal analysis, monitoring and other fields.
APA, Harvard, Vancouver, ISO, and other styles
27

Yevdokymov, Serhii. "INFLUENCE ON THE TRAIN AUTOMATION SYSTEM THROUGH DIAGNOSTIC EQUIPMENT AND FIRMWARE MODIFICATION ON THE EQUIPMENT." Cybersecurity: Education, Science, Technique 2, no. 26 (2024): 323–37. https://doi.org/10.28925/2663-4023.2024.26.643.

Full text
Abstract:
The article examines the impact of diagnostic equipment and firmware modification on train automation systems. Analyzing the current state and identifying the risks associated with the operation of such systems, the study highlights the possibility of improving technological approaches to ensure the reliability and safety of automated rail transport systems. Given the growing dependence on digital technologies, the work emphasizes the need to develop new approaches to firmware management and diagnostic systems that ensure the stability and protection of critical elements of the railway infrast
APA, Harvard, Vancouver, ISO, and other styles
28

El-Matarawey, A., Doaa M. Abd-ElGalil, and Eman M. El-Dien. "Testing the reliability of new developed firmware for controlling NIS climatic chamber." Measurement 199 (August 2022): 111366. http://dx.doi.org/10.1016/j.measurement.2022.111366.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Stramaglia, M. E. "Firmware development and testing of the ATLAS IBL Back Of Crate card." Journal of Instrumentation 10, no. 02 (2015): C02035. http://dx.doi.org/10.1088/1748-0221/10/02/c02035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Gabrielli, A., M. Backhaus, G. Balbi, et al. "Firmware development and testing of the ATLAS Pixel Detector / IBL ROD card." Journal of Instrumentation 10, no. 03 (2015): C03037. http://dx.doi.org/10.1088/1748-0221/10/03/c03037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Papp, Dorottya, Kristóf Tamás, and Levente Buttyán. "IoT Hacking – A Primer." Infocommunications journal, no. 2 (2019): 2–13. http://dx.doi.org/10.36244/icj.2019.2.1.

Full text
Abstract:
The Internet of Things (IoT) enables many new and exciting applications, but it also creates a number of new risks related to information security. Several recent attacks on IoT devices and systems illustrate that they are notoriously insecure. It has also been shown that a major part of the attacks resulted in full adversarial control over IoT devices, and the reason for this is that IoT devices themselves are weakly protected and they often cannot resist even the most basic attacks. Penetration testing or ethical hacking of IoT devices can help discovering and fixing their vulnerabilities th
APA, Harvard, Vancouver, ISO, and other styles
32

Dong, Zhijiang, Yujian Fu, and Yue Fu. "Runtime Verification on Robotics Systems." International Journal of Robotics Applications and Technologies 3, no. 1 (2015): 23–40. http://dx.doi.org/10.4018/ijrat.2015010102.

Full text
Abstract:
Runtime verification is a technique for generating monitors from formal specification of expected behaviors for the underlying system. It can be applied to automatically evaluate system execution, either on-line or off-line, analyzing extracted execution traces; or it can be used online during operation, potentially steering the application back to a safety region if a property is violated. As a so-called light-weighted formal method, runtime verification bridges the gap between system design and implementation and shorten the distance of software quality assurance between the software testing
APA, Harvard, Vancouver, ISO, and other styles
33

Dvořák, Václav, and Petr Mikušek. "Design of Arbiters and Allocators Based on Multi-Terminal BDDs." JUCS - Journal of Universal Computer Science 16, no. (14) (2010): 1826–52. https://doi.org/10.3217/jucs-016-14-1826.

Full text
Abstract:
Assigning one (more) shared resource(s) to several requesters is a function of arbiters (allocators). This class of decision-making modules can be implemented in a number of ways, from hardware to firmware to software. The paper presents a new computer-aided technique that can produce representations of arbiters/allocators in a form of a Multi-Terminal Binary Decision Diagram (MTBDD) with close to minimum cost and width. This diagram can then serve as a prototype for a cascade of multiple-output look-up tables (LUTs) that implements the given function, or for efficient firmware implementation.
APA, Harvard, Vancouver, ISO, and other styles
34

Olalekan, Ogunbiyi, Lambe Mutalub Adesina, Daniel Abayomi Ajala, and IsaacOnimisi Yusuf. "Development of an Ultrasonic-based Digital Height Measurement System." Journal Of Engineering Research Innovation And Scientific Development 1, no. 2 (2023): 49–54. http://dx.doi.org/10.61448/jerisd12237.

Full text
Abstract:
This paper presents the design, sensor selection, circuitry, firmware development, and testing of an ultrasonicbased digital height meter. An Atmega328 microcontroller is used in the design to handle sensor measurements as it investigates the utilization of HC-SR04 ultrasonic sensor technology. Firmware was developed in the Arduino IDE environment, and the sketch was uploaded to the microcontroller. The designed circuit was constructed on a Veroboard, and the casing was designed for convenience of use. Ultrasonic digital height meters are more accurate, dependable, and quick when compared to h
APA, Harvard, Vancouver, ISO, and other styles
35

Gomathi, Shirdi Botla. "Approach to Uninterrupted Gateway Upgrades in Financial Systems." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 7, no. 6 (2019): 1–4. https://doi.org/10.5281/zenodo.14508396.

Full text
Abstract:
Middleware gateway platforms are critical components in modern financial systems, facilitating secure communication, transaction processing, and integration with external services. Despite their importance, firmware upgrades on these systems often lead to downtime, disrupting banking operations and impacting customer trust. This paper explores strategies for achieving uninterrupted gateway upgrades, focusing on high-availability architectures, zero-downtime deployment techniques, comprehensive testing, and robust rollback mechanisms. By implementing these methodologies, financial institutions
APA, Harvard, Vancouver, ISO, and other styles
36

Aditya, Tomi, and Oktaf Agni Dhewa. "Design and Implementation of Update Script in the IoT-Based Smart Indoor Farming System Module at PT Inastek Using Over-the-Air Programming." Media of Computer Science 1, no. 2 (2024): 129–38. https://doi.org/10.69616/mcs.v1i2.201.

Full text
Abstract:
Extreme climate change significantly impacts Indonesia’s agricultural sector, a country with a large agrarian economy. Reduced crop productivity and in- creased risk of pest infestations threaten national food security. This study aims to develop a smart indoor farming system based on the Internet of Things (IoT) to enhance agricultural resilience and competitiveness through efficient technology. The method involves designing a system that integrates hardware and software, applying Over-The-Air (OTA) technology to update firmware on the ESP32 microcontroller. The system includes sensors, actua
APA, Harvard, Vancouver, ISO, and other styles
37

Bond, Baxter, Alana Vilagi, and Dominique J. Pride. "Noninvasive Fuel Flow Monitoring System for Vented Fuel Oil Heaters." Sensors 23, no. 12 (2023): 5664. http://dx.doi.org/10.3390/s23125664.

Full text
Abstract:
In this work, we present hardware and firmware design and preliminary testing results for a noninvasive device for measuring fuel oil consumption in fuel oil vented heaters. Fuel oil vented heaters are a popular space heating method in northern climates. Monitoring fuel consumption is useful to understanding residential daily and seasonal heating patterns and understanding the thermal characteristics of buildings. The device is a pump monitoring apparatus (PuMA) that employs a magnetoresistive sensor to monitor the activity of solenoid driven positive displacement pumps, which are commonly use
APA, Harvard, Vancouver, ISO, and other styles
38

Komarov, E. G., V. V. Lozovetsky, V. V. Lebedev, and A. V. Archipenko. "Certification and identification of possible threats to information security of software and firmware." Forestry Bulletin 26, no. 5 (2022): 145–57. http://dx.doi.org/10.18698/2542-1468-2022-5-145-157.

Full text
Abstract:
A number of methods, methods and tools are proposed for certification of software and firmware in information systems in order to select approaches and tools for working in non-standard situations in a constantly changing regulatory and methodological framework and possible threats to their information security. The type of certification under consideration is limited to methods and techniques for analyzing vulnerabilities and undeclared capabilities. This type of certification is intended for software research. Not all possible aspects related to this type of certification have been considere
APA, Harvard, Vancouver, ISO, and other styles
39

Tempel, Sören, Vladimir Herdt, and Rolf Drechsler. "SymEx-VP: An open source virtual prototype for OS-agnostic concolic testing of IoT firmware." Journal of Systems Architecture 126 (May 2022): 102456. http://dx.doi.org/10.1016/j.sysarc.2022.102456.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Qin, Zhongyuan, Jiaqi Chen, Xin Sun, et al. "Directed grey box fuzzy testing for power terminal device firmware with intermediate representation similarity comparison." Journal of Information Security and Applications 90 (May 2025): 104038. https://doi.org/10.1016/j.jisa.2025.104038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Kiełbik, Rafał, Kamil Rudnicki, Zbigniew Mudza, and Jarosław Jung. "Methodology of Firmware Development for ARUZ—An FPGA-Based HPC System." Electronics 9, no. 9 (2020): 1482. http://dx.doi.org/10.3390/electronics9091482.

Full text
Abstract:
ARUZ is a large scale, massively parallel, FPGA-based reconfigurable computational system dedicated primarily to molecular analysis. This paper presents a methodology for ARUZ firmware development that simplifies the process, offers low-level optimization, and facilitates verification. According to this methodology, firstly an expanded, generic, all-in-one VHDL description of variable Processing Elements (PEs) is developed manually. GCC preprocessing is then used to extract only the desired target functionality. A dedicated software instantiates and connects PEs in form of a scalable network,
APA, Harvard, Vancouver, ISO, and other styles
42

Kashyap, Renu, Swaraj Samal, and V. Karthikeyan. "Test Automation of Motor Over Temperature Protection Extension Module of Drive." June 2023 5, no. 2 (2023): 199–211. http://dx.doi.org/10.36548/jei.2023.2.007.

Full text
Abstract:
In industries, for releasing any product into the market, various stages of testing procedure must be done on the product to test its functionality and reliability. The testing procedure has to be frequent and accurate enough to enable early defect detection. Manual testing procedures are time-consuming, need more human resources at the place of testing, have no concept of documentation, and have more chances of human errors. To overcome the variously described limitations of manual testing, test automation is a key tool for providing prompt feedback, tracking of developed firmware versions ti
APA, Harvard, Vancouver, ISO, and other styles
43

P., Dr Rameshkumar, Bharanii S.R., Mohanram S, Prasanth R., and Venkatesh R. "Building a Full Stack Solution for Seamless Device Connectivity and Data Management." International Research Journal of Computer Science 11, no. 04 (2024): 326–28. http://dx.doi.org/10.26562/irjcs.2024.v1104.33.

Full text
Abstract:
This paper involves developing a full-stack IoT application with a cloud server. The project encompasses defining the project scope, selecting suitable hardware, developing firmware/software for IoT devices, setting up a cloud server with IoT services, configuring data ingestion and storage, building a backend application for data processing, creating a frontend UI/dashboard, establishing bidirectional communication, conducting testing, deploying the applications, and implementing continuous monitoring and optimization. By following these steps, the project aims to create a comprehensive IoT s
APA, Harvard, Vancouver, ISO, and other styles
44

Guo, Wei, Qiang Wei, Qianqiong Wu, and Zhimin Guo. "CSChecker : A binary taint-based vulnerability detection method based on static taint analysis." Journal of Physics: Conference Series 2258, no. 1 (2022): 012069. http://dx.doi.org/10.1088/1742-6596/2258/1/012069.

Full text
Abstract:
Abstract Embedded devices such as routers not only bring convenience to people’s daily life, but also increase the attack surface and security risks of devices. Embedded device applications tend to be closed source and therefore cannot be searched for vulnerabilities through source code audits. Even open source applications can be insecure because they reference third-party libraries. Binary file vulnerability mining is an important means to solve this kind of problem, but it has the problems of path explosion and low efficiency. This article uses the static stain analysis with the method of c
APA, Harvard, Vancouver, ISO, and other styles
45

Yin, Qidi, Xu Zhou, and Hangwei Zhang. "FirmHunter: State-Aware and Introspection-Driven Grey-Box Fuzzing towards IoT Firmware." Applied Sciences 11, no. 19 (2021): 9094. http://dx.doi.org/10.3390/app11199094.

Full text
Abstract:
IoT devices are exponentially increasing in all aspects of our lives. Via the web interfaces of IoT devices, attackers can control IoT devices by exploiting their vulnerabilities. In order to guarantee IoT security, testing these IoT devices to detect vulnerabilities is very important. In this work, we present FirmHunter, an automated state-aware and introspection-driven grey-box fuzzer towards Linux-based firmware images on the basis of emulation. It employs a message-state queue to overcome the dependency problem in test cases. Furthermore, it implements a scheduler collecting execution info
APA, Harvard, Vancouver, ISO, and other styles
46

Liu, Wei, and Jun Lin. "Research on the Key Technology of Security Detection of Computer BIOS." Advanced Materials Research 1049-1050 (October 2014): 2054–58. http://dx.doi.org/10.4028/www.scientific.net/amr.1049-1050.2054.

Full text
Abstract:
The firmware is an indispensable basic system in computer systems. With the increase of BIOS chip capacity and module functions, the hidden security problems of BIOS are also more and more. But there is no BIOS production capacity in Chinese mainland currently. The whole information security system has not really established completely. In the circumstances of computer widespread using in the government, institutions, commercial, schools and so on, how to ensure and monitor the security of BIOS system has important significance to ensure overall control of information security in China. This p
APA, Harvard, Vancouver, ISO, and other styles
47

Komal, Jasani. "QA and Release Management for VR Platforms: A Meta Quest Update Case Study." International Journal of Leading Research Publication 5, no. 7 (2024): 1–11. https://doi.org/10.5281/zenodo.14981313.

Full text
Abstract:
This research investigates how Meta Quest implements quality assurance and release management procedures for its VR platform updates. The paper analyzes VR development difficulties, including hardware compatibility issues, performance enhancement efforts, and tests for virtual reality immersion. This investigation analyzes established techniques that help both automated and manual testing and the system for managing launches and user input collection to boost program reliability. An analysis examines the consequences of recurring firmware and software releases for the VR system while discussin
APA, Harvard, Vancouver, ISO, and other styles
48

Avdeev, V. B., V. V. Belyaev, and T. S. Uzhakhov. "The Modernized Firmware System for Measurement of Radio Emissions: Principles of Construction, Operation and Testing Results." Telecommunications and Radio Engineering 62, no. 10 (2004): 895–901. http://dx.doi.org/10.1615/telecomradeng.v62.i10.60.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Basiladze, S. G., N. A. Shalanda та A. I. Yukaev. "Firmware realization of the bench for testing electronics of drift chambers of the CBД-2 setup". Instruments and Experimental Techniques 50, № 2 (2007): 207–14. http://dx.doi.org/10.1134/s0020441207020066.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Amit Khanna, Ananya Khanna, Arshiya Khanna, Garima Seth, Piyush Giri, and Aditi Giri. "Statistical modeling and predictive analysis of aerodynamic efficiency in NACA 2412 Airfoils: Engineering insights." International Journal of Science and Research Archive 13, no. 2 (2024): 2215–25. https://doi.org/10.30574/ijsra.2024.13.2.2358.

Full text
Abstract:
This paper investigates the effects of varying the Angle of Attack (AoA) on the aerodynamic efficiency of the NACA 2412 airfoil by analyzing the Lift-to-Drag (L/D) ratio. Using wind tunnel tests at a constant speed of 95 MPH, data was collected at 5-degree AoA increments from 0° to 30°, and L/D ratios were computed for each trial. The results revealed a parabolic relationship between AoA and L/D ratio, with maximum efficiency occurring at an AoA of approximately 20°, marking the Critical Angle of Attack. Beyond this point, aerodynamic efficiency declined, aligning with the expected stalling be
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!