CRYPTODY: Cryptographic Misuse Analysis of IoT Firmware via Data-flow Reasoning

被引:1
作者
Wang, Jianing [1 ]
Guo, Shanqing [2 ]
Diao, Wenrui [2 ]
Liu, Yue [3 ,4 ]
Duan, Haixin [5 ,6 ,7 ]
Liu, Yichen [8 ]
Liang, Zhenkai [1 ]
机构
[1] Natl Univ Singapore, Singapore, Singapore
[2] Shandong Univ, Jinan, Peoples R China
[3] Southeast Univ, Nanjing, Peoples R China
[4] QI ANXIN Grp, Beijing, Peoples R China
[5] Tsinghua Univ, Beijing, Peoples R China
[6] Zhongguancun Lab, Beijing, Peoples R China
[7] Quancheng Lab, Jinan, Peoples R China
[8] Indiana Univ Bloomington, Bloomington, IN USA
来源
PROCEEDINGS OF 27TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2024 | 2024年
基金
中国国家自然科学基金; 新加坡国家研究基金会;
关键词
Cryptographic misuse; IoT firmware; Data-flow analysis;
D O I
10.1145/3678890.3678914
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptographic techniques form the foundation of the security and privacy of computing solutions. However, if cryptographic APIs are not invoked correctly, they can result in significant security problems. In this paper, we abstract the intricate crypto misuse detection problem as a data-flow reasoning task. Towards this end, we propose CrypTody, a novel logic-inference-based framework for detecting crypto misuses via reasoning about data flows on multi-architecture IoT firmware images. It carries out cross-architecture analysis, with detection strategies to reduce false positives and false negatives, such as cross-flow misuse inference. To evaluate the effectiveness of CrypTody, we conducted a large-scale experiment on 1,431 firmware images from 16 vendors. Our evaluation shows that 46% of the firmware images have high-risk misuses and 95% have at least one cryptographic misuse. In total, we find 6,624 potential crypto misuses, with 760 being cross-flow misuses that are not detected by existing solutions. We have responsibly disclosed portions of our findings to the relevant vendors. From the feedback, we note that CrypTody has a low false-positive rate for the confirmed misuses. Some typical cases have been assigned CVEs and fixed by the vendors.
引用
收藏
页码:579 / 593
页数:15
相关论文
共 57 条
  • [1] Comparing the Usability of Cryptographic APIs
    Acar, Yasemin
    Backes, Michael
    Fahl, Sascha
    Garfinkel, Simson
    Kim, Doowon
    Mazurek, Michelle L.
    Stransky, Christian
    [J]. 2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 154 - 171
  • [2] CRYPTOAPI-BENCH: A Comprehensive Benchmark on Java']Java Cryptographic API Misuses
    Afrose, Sharmin
    Rahaman, Sazzadur
    Yao, Danfeng
    [J]. 2019 IEEE SECURE DEVELOPMENT (SECDEV 2019), 2019, : 49 - 61
  • [3] Ami AS, 2022, P IEEE S SECUR PRIV, P614, DOI [10.1109/SP46214.2022.00024, 10.1109/SP46214.2022.9833582]
  • [4] Arzt S, 2014, ACM SIGPLAN NOTICES, V49, P259, DOI [10.1145/2666356.2594299, 10.1145/2594291.2594299]
  • [5] Bugcrowd, 2023, Bugcrowd: Crowdsourced Cybersecurity Platform
  • [6] Towards Automated Dynamic Analysis for Linux-based Embedded Firmware
    Chen, Daming D.
    Egele, Manuel
    Woo, Maverick
    Brumley, David
    [J]. 23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016), 2016,
  • [7] IOTFUZZER: Discovering Memory Corruptions in IoT Through App-based Fuzzing
    Chen, Jiongyi
    Diao, Wenrui
    Zhao, Qingchuan
    Zuo, Chaoshun
    Lin, Zhiqiang
    Wang, XiaoFeng
    Lau, Wing Cheong
    Sun, Menghan
    Yang, Ronghai
    Zhang, Kehuan
    [J]. 25TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2018), 2018,
  • [8] Chen Yikang, 2024, NDSS
  • [9] Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces
    Costin, Andrei
    Zarras, Apostolis
    Francillon, Aurelien
    [J]. ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 437 - 448
  • [10] Costin A, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P95