Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces

被引:137
作者
Costin, Andrei [1 ]
Zarras, Apostolis [2 ]
Francillon, Aurelien [1 ]
机构
[1] EURECOM, Biot, France
[2] Tech Univ Munich, D-80290 Munich, Germany
来源
ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2016年
关键词
D O I
10.1145/2897845.2897900
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Embedded devices are becoming more widespread, interconnected, and web-enabled than ever. However, recent studies showed that embedded devices are far from being secure. Moreover, many embedded systems rely on web interfaces for user interaction or administration. Web security is still difficult and therefore the web interfaces of embedded systems represent a considerable attack surface. In this paper, we present the first fully automated framework that applies dynamic firmware analysis techniques to achieve, in a scalable manner, automated vulnerability discovery within embedded firmware images. We apply our framework to study the security of embedded web interfaces running in Commercial Off-The-Shelf (COTS) embedded devices, such as routers, DSL/cable modems, VoIP phones, IP/CCTV cameras. We introduce a methodology and implement a scalable framework for discovery of vulnerabilities in embedded web interfaces regardless of the devices' vendor, type, or architecture. To reach this goal, we perform full system emulation to achieve the execution of firmware images in a software-only environment, i.e., without involving any physical embedded devices. Then, we automatically analyze the web interfaces within the firmware using both static and dynamic analysis tools. We also present some interesting case-studies and discuss the main challenges associated with the dynamic analysis of firmware images and their web interfaces and network services. The observations we make in this paper shed light on an important aspect of embedded devices which was not previously studied at a large scale.
引用
收藏
页码:437 / 448
页数:12
相关论文
共 51 条
[1]  
[Anonymous], 2014, USENIX SEC S
[2]  
BALZAROTTI D, 2008, IEEE S SEC PRIV
[3]   State of the Art: Automated Black-Box Web Application Vulnerability Testing [J].
Bau, Jason ;
Bursztein, Elie ;
Gupta, Divij ;
Mitchell, John .
2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, :332-345
[4]  
Bojinov H., 2009, BLACKHAT US
[5]  
Chen D. D., 2016, ISOC NETW DISTR SYST
[6]  
Christey S., 2007, VULNERABILITY TYPE D
[7]  
Cohen I., 2004, OSDI
[8]  
Cui A., 2010, ANN COMP SEC APPL C
[9]  
DOUPE A, 2012, USENIX SEC S
[10]  
DOUPE A., 2010, DETECTION INTRUSIONS