FirmFuzz: Automated IoT Firmware Introspection and Analysis

被引:51
作者
Srivastava, Prashast [1 ]
Peng, Hui [1 ]
Li, Jiahao [2 ]
Okhravi, Hamed [3 ]
Shrobe, Howard [2 ]
Payer, Mathias [4 ]
机构
[1] Purdue Univ, W Lafayette, IN 47907 USA
[2] MIT CSAIL, Cambridge, MA USA
[3] MIT Lincoln Lab, Lexington, MA USA
[4] Ecole Polytech Fed Lausanne, Lausanne, Switzerland
来源
PROCEEDINGS OF THE 2ND INTERNATIONAL ACM WORKSHOP ON SECURITY AND PRIVACY FOR THE INTERNET-OF-THINGS (IOT S&P'19) | 2019年
关键词
D O I
10.1145/3338507.3358616
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
While the number of IoT devices grows at an exhilarating pace their security remains stagnant. Imposing secure coding standards across all vendors is infeasible. Testing individual devices allows an analyst to evaluate their security post deployment. Any discovered vulnerabilities can then be disclosed to the vendors in order to assist them in securing their products. The search for vulnerabilities should ideally be automated for efficiency and furthermore be device-independent for scalability. We present FirmFuzz, an automated device-independent emulation and dynamic analysis framework for Linux-based firmware images. It employs a greybox-based generational fuzzing approach coupled with static analysis and system introspection to provide targeted and deterministic bug discovery within a firmware image. We evaluate FirmFuzz by emulating and dynamically analyzing 32 images (from 27 unique devices) with a network accessible from the host performing the emulation. During testing, FirmFuzz discovered seven previously undisclosed vulnerabilities across six different devices: two IP cameras and four routers. So far, 4 CVE's have been assigned.
引用
收藏
页码:15 / 21
页数:7
相关论文
共 12 条
  • [1] Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
  • [2] Chen Daming Dominic, 2016, P NDSS, P21
  • [3] Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces
    Costin, Andrei
    Zarras, Apostolis
    Francillon, Aurelien
    [J]. ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 437 - 448
  • [4] Godefroid P, 2017, IEEE INT CONF AUTOM, P50, DOI 10.1109/ASE.2017.8115618
  • [5] Nervaux Antoine, 2018, VULNERABILITY DISCLO
  • [6] Nordrum A, 2018, POPULAR INTERNET THI
  • [7] Pierre Kim, 2018, PWNING DLINK 850L RO
  • [8] RIPS, 2018, RIPS PHP STAT AN
  • [9] Router, 2018, DEF ROUT PASSW INT M
  • [10] Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware
    Shoshitaishvili, Yan
    Wang, Ruoyu
    Hauser, Christophe
    Kruegel, Christopher
    Vigna, Giovanni
    [J]. 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,