A Review of IoT Firmware Vulnerabilities and Auditing Techniques

被引:12
作者
Bakhshi, Taimur [1 ,2 ]
Ghita, Bogdan [2 ]
Kuzminykh, Ievgeniia [3 ]
机构
[1] Natl Univ Comp & Emerging Sci, Ctr Informat Management & Cyber Secur, Lahore 54770, Pakistan
[2] Univ Plymouth, Sch Engn Comp & Math, Plymouth PL4 8AA, England
[3] Kings Coll London, Dept Informat, London WC2R 2ND, England
关键词
Internet of Things; firmware auditing; reverse engineering; security testing; EMBEDDED DEVICES; INTERNET; SECURITY; THINGS; INDUSTRY; ANATOMY; ATTACKS;
D O I
10.3390/s24020708
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
In recent years, the Internet of Things (IoT) paradigm has been widely applied across a variety of industrial and consumer areas to facilitate greater automation and increase productivity. Higher dependability on connected devices led to a growing range of cyber security threats targeting IoT-enabled platforms, specifically device firmware vulnerabilities, often overlooked during development and deployment. A comprehensive security strategy aiming to mitigate IoT firmware vulnerabilities would entail auditing the IoT device firmware environment, from software components, storage, and configuration, to delivery, maintenance, and updating, as well as understanding the efficacy of tools and techniques available for this purpose. To this effect, this paper reviews the state-of-the-art technology in IoT firmware vulnerability assessment from a holistic perspective. To help with the process, the IoT ecosystem is divided into eight categories: system properties, access controls, hardware and software re-use, network interfacing, image management, user awareness, regulatory compliance, and adversarial vectors. Following the review of individual areas, the paper further investigates the efficiency and scalability of auditing techniques for detecting firmware vulnerabilities. Beyond the technical aspects, state-of-the-art IoT firmware architectures and respective evaluation platforms are also reviewed according to their technical, regulatory, and standardization challenges. The discussion is accompanied also by a review of the existing auditing tools, the vulnerabilities addressed, the analysis method used, and their abilities to scale and detect unknown attacks. The review also proposes a taxonomy of vulnerabilities and maps them with their exploitation vectors and with the auditing tools that could help in identifying them. Given the current interest in analysis automation, the paper explores the feasibility and impact of evolving machine learning and blockchain applications in securing IoT firmware. The paper concludes with a summary of ongoing and future research challenges in IoT firmware to facilitate and support secure IoT development.
引用
收藏
页数:28
相关论文
共 151 条
  • [1] Abdul-Ghani HA, 2018, INT J ADV COMPUT SC, V9, P355
  • [2] INVITED Things, Trouble, Trust: On Building Trust in IoT Systems
    Abera, Tigist
    Asokan, N.
    Davi, Lucas
    Koushanfar, Farinaz
    Paverd, Andrew
    Sadeghi, Ahmad-Reza
    Tsudik, Gene
    [J]. 2016 ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2016,
  • [3] Security in Internet of Things: issues, challenges, taxonomy, and architecture
    Adat, Vipindev
    Gupta, B. B.
    [J]. TELECOMMUNICATION SYSTEMS, 2018, 67 (03) : 423 - 441
  • [4] Ranking Security of IoT-Based Smart Home Consumer Devices
    Allifah, Naba M.
    Zualkernan, Imran A.
    [J]. IEEE ACCESS, 2022, 10 : 18352 - 18369
  • [5] Internet of Things: A survey on the security of IoT frameworks
    Ammar, Mahmoud
    Russello, Giovanni
    Crispo, Bruno
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 38 : 8 - 27
  • [6] [Anonymous], 2023, Kaspersky Unveils an Overview of IoT-Related Threats
  • [7] [Anonymous], IDA Pro: A Powerful Disassembler and a Versatile Debugger
  • [8] [Anonymous], Firmadyne: Platform for Emulation and Dynamic Analysis of Linux-Based Firmware
  • [9] [Anonymous], 2021, Microsoft Security Signals
  • [10] [Anonymous], Radare2: Libre Reversing Framework for Unix Geeks