Battling against Protocol Fuzzing: Protecting Networked Embedded Devices from Dynamic Fuzzers

被引:0
作者
Liu, Puzhuo [1 ,2 ]
Zheng, Yaowen [3 ]
Sun, Chengnian [4 ]
Li, Hong [5 ,6 ]
Li, Zhi [1 ,2 ]
Sun, Limin [1 ,2 ]
机构
[1] Univ Chinese Acad Sci, Beijing Key Lab IoT Informat Secur Technol, Inst Informat Engn, CAS,Sch Cyber Secur, 19 Shucun Rd, Beijing 100085
[2] Univ Chinese Acad Sci, Sch Cyber Secur, 1 Yanqihu East Rd, Beijing 101408, Peoples R China
[3] Nanyang Technol Univ, 50 Nanyang Ave, Singapore 639798, Singapore
[4] Univ Waterloo, Cheriton Sch Comp Sci, 200 Univ Ave W, Waterloo, ON N2L 3G1, Canada
[5] Chinese Acad Sci, Inst Informat Engn, 19 Shucun Rd, Beijing 100085, Peoples R China
[6] Univ Chinese Acad Sci, Sch Cyber Secur, 1 Yanqihu East Rd, Beijing 101408, Peoples R China
关键词
Internet of Things; protocol fuzzing; anti-fuzzing;
D O I
10.1145/3641847
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Networked Embedded Devices (NEDs) are increasingly targeted by cyberattacks, mainly due to their widespread use in our daily lives. Vulnerabilities in NEDs are the root causes of these cyberattacks. Although deployed NEDs go through thorough code audits, there can still be considerable exploitable vulnerabilities. Existing mitigation measures like code encryption and obfuscation adopted by vendors can resist static analysis on deployed NEDs, but are ineffective against protocol fuzzing. Attackers can easily apply protocol fuzzing to discover vulnerabilities and compromise deployed NEDs. Unfortunately, prior anti-fuzzing techniques are impractical as they significantly slow down NEDs, hampering NED availability. To address this issue, we propose Armor-the first anti-fuzzing technique specifically designed for NEDs. First, we design three adversarial primitives-delay, fake coverage, and forged exception-to break the fundamental mechanisms on which fuzzing relies to effectively find vulnerabilities. Second, based on our observation that inputs from normal users consistent with the protocol specification and certain program paths are rarely executed with normal inputs, we design static and dynamic strategies to decide whether to activate the adversarial primitives. Extensive evaluations show that Armor incurs negligible time overhead and effectively reduces the code coverage (e.g., line coverage by 22%-61%) for fuzzing, significantly outperforming the state of the art.
引用
收藏
页数:26
相关论文
empty
未找到相关数据