OVER: Overhauling Vulnerability Detection for IoT through an Adaptable and Automated Static Analysis Framework

被引:10
作者
Sachidananda, Vinay [1 ]
Bhairav, Suhas [2 ]
Elovici, Yuval [3 ]
机构
[1] Trustwave, Singapore, Singapore
[2] iTrust Singapore Univ Technol & Design, Singapore, Singapore
[3] Ben Gurion Univ Negev, Beer Sheva, Israel
来源
PROCEEDINGS OF THE 35TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING (SAC'20) | 2020年
关键词
Internet of Things (IoT); Security and Privacy; Security Analysis; Vulnerabilities; Vulnerability Detection; Static Analysis; SECURITY;
D O I
10.1145/3341105.3373930
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Internet of Things (IoT) exposes various vulnerabilities at the software level. In this paper, we propose a static analysis framework for IoT. The proposed framework is designed for detecting security vulnerabilities such as Buffer Overflow, Memory Leaks, Code Injection, TOCTOU, Banned functions, and other code-related vulnerabilities. We consider end-to-end IoT software suite that includes kernels, protocol stacks, APKs, firmware, and others. In particular, we unpacked and analyzed over 21,000 IoT firmware, 628 IoT APKs and 50 IoT Open Source Software (OSS). Our framework is an adaptable and automated static analysis technique that begins with crawling the web for fetching the IoT related files and ends with report generation consisting of IoT Risk Rating. In total, we were able to raise 7 new CVEs and detected 342 existing CVEs and 894 vulnerable code clones in IoT OSS. We found over 70% of APKs vulnerable to SQL Injection and 56% APKs using weak cryptographic algorithms. Also, our framework found 3783 hard-coded passwords and archaic BusyBox versions in IoT firmware.
引用
收藏
页码:729 / 738
页数:10
相关论文
共 60 条
[1]  
Afonso Vitor Monte, 2016, NDSS
[2]  
Alnaeli SM, 2016, 2016 IEEE 3RD WORLD FORUM ON INTERNET OF THINGS (WF-IOT), P348, DOI 10.1109/WF-IoT.2016.7845497
[3]  
[Anonymous], 2013, USENIX SEC S USENIX
[4]  
[Anonymous], 2009, P INT C INTERNET TEC, DOI DOI 10.1109/ICITST.2009.5402604
[5]  
[Anonymous], 2006, TECHNICAL REPORT
[6]  
Ayewah N, 2007, COMPANION 22 ACM SIG, P805, DOI DOI 10.1145/1297846.1297897
[7]   Using static analysis to find bugs [J].
Ayewah, Nathaniel ;
Pugh, William ;
Hovemeyer, David ;
Morgenthaler, J. David ;
Penix, John .
IEEE SOFTWARE, 2008, 25 (05) :22-29
[8]  
Ball T., 2006, Operating Systems Review, V40, P73, DOI 10.1145/1218063.1217943
[9]   Saner: Composing static and dynamic analysis to validate sanitization in web applications [J].
Balzarotti, Davide ;
Cova, Marco ;
Felmetsger, Vika ;
Jovanovic, Nenad ;
Kirda, Engin ;
Kruegel, Christopher ;
Vigna, Giovanni .
PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2008, :387-+
[10]  
Batyuk L., 2011, 2011 6th International Conference on Malicious and Unwanted Software, P66, DOI 10.1109/MALWARE.2011.6112328