A Study on Vulnerability Analysis and Memory Forensics of ESP32
Jiyeon Baek, Jiwon Jang, Seongmin Kim, Journal of Internet Computing and Services, Vol. 25, No. 3, pp. 1-8, Jun. 2024
Keywords: Memory Forensics, Over-The-Air (OTA), ESP32, Attack Scenario
Abstract
Statistics
Show / Hide Statistics
Statistics (Past 3 Years)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Past 3 Years)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
|
Cite this article
[APA Style]
Baek, J., Jang, J., & Kim, S. (2024). A Study on Vulnerability Analysis and Memory Forensics of ESP32. Journal of Internet Computing and Services, 25(3), 1-8. DOI: 10.7472/jksii.2024.25.3.1.
[IEEE Style]
J. Baek, J. Jang, S. Kim, "A Study on Vulnerability Analysis and Memory Forensics of ESP32," Journal of Internet Computing and Services, vol. 25, no. 3, pp. 1-8, 2024. DOI: 10.7472/jksii.2024.25.3.1.
[ACM Style]
Jiyeon Baek, Jiwon Jang, and Seongmin Kim. 2024. A Study on Vulnerability Analysis and Memory Forensics of ESP32. Journal of Internet Computing and Services, 25, 3, (2024), 1-8. DOI: 10.7472/jksii.2024.25.3.1.

