submitted by /u/sebazzen
[link] [comments]
Print
Share
Comment
Cite
Upload
Translate

APA
() » Finding vulnerabiities in LoRaWAN’s Protocol Stacks: Emulation with Qiling/Unicorn, P-Code emulation with Ghidra and AFL++ Fuzzing (Quick summary + complete 40 pages paper). Retrieved from https://www.truth.cx/2022/01/11/finding-vulnerabiities-in-lorawans-protocol-stacks-emulation-with-qiling-unicorn-p-code-emulation-with-ghidra-and-afl-fuzzing-quick-summary-complete-40-pages-paper/.
MLA" » Finding vulnerabiities in LoRaWAN’s Protocol Stacks: Emulation with Qiling/Unicorn, P-Code emulation with Ghidra and AFL++ Fuzzing (Quick summary + complete 40 pages paper)." - , https://www.truth.cx/2022/01/11/finding-vulnerabiities-in-lorawans-protocol-stacks-emulation-with-qiling-unicorn-p-code-emulation-with-ghidra-and-afl-fuzzing-quick-summary-complete-40-pages-paper/
HARVARD » Finding vulnerabiities in LoRaWAN’s Protocol Stacks: Emulation with Qiling/Unicorn, P-Code emulation with Ghidra and AFL++ Fuzzing (Quick summary + complete 40 pages paper)., viewed ,
VANCOUVER - » Finding vulnerabiities in LoRaWAN’s Protocol Stacks: Emulation with Qiling/Unicorn, P-Code emulation with Ghidra and AFL++ Fuzzing (Quick summary + complete 40 pages paper). [Internet]. [Accessed ]. Available from: https://www.truth.cx/2022/01/11/finding-vulnerabiities-in-lorawans-protocol-stacks-emulation-with-qiling-unicorn-p-code-emulation-with-ghidra-and-afl-fuzzing-quick-summary-complete-40-pages-paper/
CHICAGO" » Finding vulnerabiities in LoRaWAN’s Protocol Stacks: Emulation with Qiling/Unicorn, P-Code emulation with Ghidra and AFL++ Fuzzing (Quick summary + complete 40 pages paper)." - Accessed . https://www.truth.cx/2022/01/11/finding-vulnerabiities-in-lorawans-protocol-stacks-emulation-with-qiling-unicorn-p-code-emulation-with-ghidra-and-afl-fuzzing-quick-summary-complete-40-pages-paper/
IEEE" » Finding vulnerabiities in LoRaWAN’s Protocol Stacks: Emulation with Qiling/Unicorn, P-Code emulation with Ghidra and AFL++ Fuzzing (Quick summary + complete 40 pages paper)." [Online]. Available: https://www.truth.cx/2022/01/11/finding-vulnerabiities-in-lorawans-protocol-stacks-emulation-with-qiling-unicorn-p-code-emulation-with-ghidra-and-afl-fuzzing-quick-summary-complete-40-pages-paper/. [Accessed: ]