Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic Execution

被引:26
作者
Yao, Yao [1 ,2 ]
Zhou, Wei [2 ]
Jia, Yan [1 ,2 ]
Zhu, Lipeng [1 ,2 ]
Liu, Peng [3 ]
Zhang, Yuqing [1 ,2 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian, Shaanxi, Peoples R China
[2] Univ Chinese Acad Sci, Natl Comp Network Intrus Protect Ctr, Beijing, Peoples R China
[3] Penn State Univ, Coll Informat Sci & Technol, State Coll, PA USA
来源
COMPUTER SECURITY - ESORICS 2019, PT I | 2019年 / 11735卷
基金
中国国家自然科学基金;
关键词
Internet of Things; Firmware analysis; Privilege separation;
D O I
10.1007/978-3-030-29959-0_31
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid proliferation of IoT devices, we have witnessed increasing security breaches targeting IoT devices. To address this, considerable attention has been drawn to the vulnerability discovery of IoT firmware. However, in contrast to the traditional firmware bugs/vulnerabilities (e.g. memory corruption), the privilege separation model in IoT firmware has not yet been systematically investigated. In this paper, we conducted an in-depth security analysis of the privilege separation model of IoT firmware and identified a previously unknown vulnerability called privilege separation vulnerability. By combining loading information extraction, library function recognition and symbolic execution, we developed Gerbil, a firmware-analysis-specific extension of the Angr framework for analyzing binaries to effectively identify privilege separation vulnerabilities in IoT firmware. So far, we have evaluated Gerbil on 106 real-world IoT firmware images (100 of which are bare-metal and RTOS-based device firmware. Gerbil have successfully detected privilege separation vulnerabilities in 69 of them. We have also verified and exploited the privilege separation vulnerabilities in several popular smart devices including Xiaomi smart gateway, Changdi smart oven and TP-Link smart WiFi plug. Our research demonstrates that an attacker can leverage the privilege separation vulnerability to launch a border spectrum of attacks such as malicious firmware replacement and denial of service.
引用
收藏
页码:638 / 657
页数:20
相关论文
共 25 条
[1]  
[Anonymous], 2016, NDSS
[2]  
[Anonymous], 2015, NDSS
[3]  
[Anonymous], 2014, P 2014 NETW DISTR SY
[4]   Towards Automated Dynamic Analysis for Linux-based Embedded Firmware [J].
Chen, Daming D. ;
Egele, Manuel ;
Woo, Maverick ;
Brumley, David .
23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016), 2016,
[5]  
Chen J., 2018, 25 ANN NETW DISTR SY
[6]   Dynamic binary analyzer for scanning vulnerabilities with taint analysis [J].
Choi, Young-Hyun ;
Park, Min-Woo ;
Eom, Jung-Ho ;
Chung, Tai-Myoung .
MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (07) :2301-2320
[7]   Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces [J].
Costin, Andrei ;
Zarras, Apostolis ;
Francillon, Aurelien .
ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :437-448
[8]  
Costin A, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P95
[9]  
Ericson, 2019, ERICSON ERICSSON MOB
[10]  
Fernandes E., 2018, P NETW DISTR SYST S, P18