IoT Firmware Emulation and Its Security Application in Fuzzing: A Critical Revisit

被引:0
作者
Zhou, Wei [1 ]
Shen, Shandian [1 ]
Liu, Peng [2 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Cyber Sci & Engn, Wuhan 430074, Peoples R China
[2] Penn State Univ, Coll Informat Sci & Technol, University Pk, PA 16802 USA
基金
中国国家自然科学基金; 美国国家科学基金会;
关键词
IoT devices; MCU; firmware; vulnerability detection; peripheral modeling; firmware emulation; fuzz testing; hardware-in-the-loop;
D O I
10.3390/fi17010019
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As IoT devices with microcontroller (MCU)-based firmware become more common in our lives, memory corruption vulnerabilities in their firmware are increasingly targeted by adversaries. Fuzzing is a powerful method for detecting these vulnerabilities, but it poses unique challenges when applied to IoT devices. Direct fuzzing on these devices is inefficient, and recent efforts have shifted towards creating emulation environments for dynamic firmware testing. However, unlike traditional software, firmware interactions with peripherals that are significantly more diverse presents new challenges for achieving scalable full-system emulation and effective fuzzing. This paper reviews 27 state-of-the-art works in MCU-based firmware emulation and its applications in fuzzing. Instead of classifying existing techniques based on their capabilities and features, we first identify the fundamental challenges faced by firmware emulation and fuzzing. We then revisit recent studies, organizing them according to the specific challenges they address, and discussing how each specific challenge is addressed. We compare the emulation fidelity and bug detection capabilities of various techniques to clearly demonstrate their strengths and weaknesses, aiding users in selecting or combining tools to meet their needs. Finally, we highlight the remaining technical gaps and point out important future research directions in firmware emulation and fuzzing.
引用
收藏
页数:20
相关论文
共 58 条
  • [51] Challenges in Firmware Re-Hosting, Emulation, and Analysis
    Wright, Christopher
    Moeglein, William A.
    Bagchi, Saurabh
    Kulkarni, Milind
    Clements, Abraham A.
    [J]. ACM COMPUTING SURVEYS, 2021, 54 (01)
  • [52] Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic Execution
    Yao, Yao
    Zhou, Wei
    Jia, Yan
    Zhu, Lipeng
    Liu, Peng
    Zhang, Yuqing
    [J]. COMPUTER SECURITY - ESORICS 2019, PT I, 2019, 11735 : 638 - 657
  • [53] Yun I, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P745
  • [54] Avatar: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares
    Zaddach, Jonas
    Bruno, Luca
    Francillon, Aurelien
    Balzarotti, Davide
    [J]. 21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
  • [55] Zalewski M., American fuzzy lop
  • [56] Zhou W., 2023, P WORKSH BIN AN RES
  • [57] Zhou W, 2021, PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, P2007
  • [58] METAEMU: An Architecture Agnostic Rehosting Framework for Automotive Firmware<bold> </bold>
    Chen, Zitai
    Thomas, Sam L.
    Garcia, Flavio D.
    [J]. PROCEEDINGS OF THE 2022 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2022, 2022, : 515 - 529