Framework to perform taint analysis and security assessment of IoT devices in smart cities

被引:1
作者
Bhardwaj, Akashdeep [1 ]
Vishnoi, Ankit [2 ]
Bharany, Salil [3 ]
Abdelmaboud, Abdelzahir [4 ]
Ibrahim, Ashraf Osman [5 ]
Mamoun, Mohamed [6 ]
Nagmeldin, Wamda [7 ]
机构
[1] Univ Petr & Energy Studies, Sch Comp Sci, Dehra Dun, India
[2] Symbiosis Int Deemed Univ SIU, Symbiosis Inst Technol SIT, Comp Sci & Engn Dept, Pune, India
[3] Lovely Profess Univ, Dept Comp Sci & Engn, Phagwara, Punjab, India
[4] King Khalid Univ, Dept Informat Syst, Muhayel Aseer, Saudi Arabia
[5] Univ Malaysia Sabah, Kinabalu, Sabah, Malaysia
[6] Alzaiem Alazhari Univ, Khartoum, Sudan
[7] Prince Sattam Bin Abdulaziz Univ, Al Kharj, Saudi Arabia
关键词
IoT; Firmware; Bootloader; Taint analysis; Application layer; Dataflow; Security assessments; FIRMWARE; INTERNET; THINGS; TECHNOLOGY;
D O I
10.7717/peerj-cs.1771
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet of Things has a bootloader and applications responsible for initializing the device's hardware and loading the operating system or firmware. Ensuring the security of the bootloader is crucial to protect against malicious firmware or software being loaded onto the device. One way to increase the security of the bootloader is to use digital signature verification to ensure that only authorized firmware can be loaded onto the device. Additionally, implementing secure boot processes, such as a chain of trust, can prevent unauthorized access to the device's firmware and protect against tampering during the boot process. This research is based on the firmware bootloader and application dataflow taint analysis and security assessment of IoT devices as the most critical step in ensuring the security and integrity of these devices. This process helps identify vulnerabilities and potential attack vectors that attackers could exploit and provides a foundation for developing effective remediation strategies.
引用
收藏
页数:20
相关论文
共 25 条
[1]   Internet of Things: A survey on the security of IoT frameworks [J].
Ammar, Mahmoud ;
Russello, Giovanni ;
Crispo, Bruno .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 38 :8-27
[2]  
Anand P, 2022, 2022 IEEE 2 MYSORE S, P1, DOI [10.1109/MysuruCon55714.2022.9972554, DOI 10.1109/MYSURUCON55714.2022.9972554]
[3]  
Arm Ltd, What is an operating system, arm | the architecture for the digital world
[4]   Blockchain-Based Healthcare Workflow for Tele-Medical Laboratory in Federated Hospital IoT Clouds [J].
Celesti, Antonio ;
Ruggeri, Armando ;
Fazio, Maria ;
Galletta, Antonino ;
Villari, Massimo ;
Romano, Agata .
SENSORS, 2020, 20 (09)
[5]   Blockchain-Based Distributed Firmware Update Architecture for IoT Devices [J].
Choi, Seoyun ;
Lee, Jong-Hyouk .
IEEE ACCESS, 2020, 8 :37518-37525
[6]   A Large-Scale Analysis of IoT Firmware Version Distribution in the Wild [J].
Ebbers, Frank .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2023, 49 (02) :816-830
[7]   Toward a generic and secure bootloader for IoT device firmware OTA update [J].
El Jaouhari, Saad ;
Bouvet, Eric .
36TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2022), 2022, :90-95
[8]   Detecting Vulnerability on IoT Device Firmware: A Survey [J].
Feng, Xiaotao ;
Zhu, Xiaogang ;
Han, Qing-Long ;
Zhou, Wei ;
Wen, Sheng ;
Xiang, Yang .
IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2023, 10 (01) :25-41
[9]  
Gillis A., 2022, IoT Agenda
[10]   FIRMCORN: Vulnerability-Oriented Fuzzing of IoT Firmware via Optimized Virtual Execution [J].
Gui, Zhijie ;
Shu, Hui ;
Kang, Fei ;
Xiong, Xiaobing .
IEEE ACCESS, 2020, 8 :29826-29841