Understanding Security Risks of Embedded Devices Through Fine-Grained Firmware Fingerprinting

被引:1
|
作者
Li, Qiang [1 ]
Tan, Dawei [1 ]
Ge, Xin [1 ]
Wang, Haining [2 ]
Li, Zhi [3 ,4 ]
Liu, Jiqiang [1 ]
机构
[1] Beijing Jiaotong Univ, Sch Comp & Informat Technol, Beijing 100044, Peoples R China
[2] Virginia Tech, Dept Elect & Comp Engn, Blacksburg, VA 24061 USA
[3] Chinese Acad Sci, Inst Informat Engn, Beijing 100093, Peoples R China
[4] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100049, Peoples R China
基金
国家重点研发计划;
关键词
Security; Internet; Microprogramming; Blogs; Performance evaluation; Fingerprint recognition; Software; Firmware; fingerprinting; embedded device; vulnerability;
D O I
10.1109/TDSC.2021.3119970
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
An increasing number of embedded devices are connecting to the Internet, ranging from cameras, routers to printers, while an adversary can exploit security flaws already known to compromise those devices. Security patches are usually associated with the device firmware, which relies on the device vendors and products. Due to compatibility and release-time issues, many embedded devices are still using outdated firmware with known vulnerabilities or flaws. In this article, we conduct a systematic study on device vulnerabilities by leveraging firmware fingerprints. Specifically, we use a web crawler to gather 9,716 firmware images from official websites of device vendors, and 347,685 security reports scattered across data archives, blogs, and forums. We propose to generate fine-grained fingerprints based on the subtle differences between the filesystems of various firmware images. Furthermore, machine learning algorithms and regex are used to identify device vulnerabilities and corresponding device firmware fingerprints. We perform real-world experiments to validate the performance of the firmware fingerprint, which yields high accuracy of 91% precision and 90% recall. We reveal that 6,898 reports have the firmware and related vulnerability information, and there are more than 10% of firmware vulnerabilities without any patches or solutions for mitigating underlying security risks.
引用
收藏
页码:4099 / 4112
页数:14
相关论文
共 50 条
  • [1] Towards Fine-grained Fingerprinting of Firmware in Online Embedded Devices
    Li, Qiang
    Feng, Xuan
    Wang, Haining
    Li, Zhi
    Sun, Limin
    [J]. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2018), 2018, : 2537 - 2545
  • [2] BIGMAC: Fine-Grained Policy Analysis of Android Firmware
    Hernandez, Grant
    Tian, Dave
    Yadav, Anurag Swarnim
    Williams, Byron J.
    Butler, Kevin R. B.
    [J]. PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, 2020, : 271 - 287
  • [3] FIFS: Fine-grained Indoor Fingerprinting System
    Xiao, Jiang
    Wu, Kaishun
    Yi, Youwen
    Ni, Lionel M.
    [J]. 2012 21ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2012,
  • [4] Fine-Grained Forward Secure Firmware Update in Smart Home
    Zhao, Qiuxia
    Zheng, Dong
    Zhang, Yinghui
    Ren, Yan
    [J]. MATHEMATICS, 2023, 11 (14)
  • [5] Fine-Grained User-Space Security Through Virtualization
    Payer, Mathias
    Gross, Thomas R.
    [J]. ACM SIGPLAN NOTICES, 2011, 46 (07) : 157 - 168
  • [6] Fine-grained Program Partitioning for Security
    Huang, Zhen
    Jaeger, Trent
    Tan, Gang
    [J]. PROCEEDINGS OF THE 14TH EUROPEAN WORKSHOP ON SYSTEMS SECURITY (EUROSEC 2021), 2021, : 21 - 26
  • [7] A Fine-Grained Hardware Security Approach for Runtime Code Integrity in Embedded Systems
    Wang, Xiang
    Wang, Weike
    Xu, Bin
    Du, Pei
    Li, Lin
    Liu, Muyang
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2018, 24 (04) : 515 - 536
  • [8] Fine-grained visual understanding and reasoning
    Yu, Jun
    Yang, Yezhou
    Murtagh, Fionn
    Gao, Xinbo
    [J]. NEUROCOMPUTING, 2020, 398 : 408 - 410
  • [9] Fine-grained Augmentation for RF Fingerprinting under Impaired Channels
    Gul, Omer Melih
    Kulhandjian, Michel
    Kantarci, Burak
    Touazi, Azzedine
    Ellement, Cliff
    D'Amours, Claude
    [J]. 2022 IEEE 27TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (CAMAD), 2022, : 115 - 120
  • [10] Fine-Grained Fingerprinting Threats to Software-Defined Networks
    Zhang, Minjian
    Hou, Jianwei
    Zhang, Ziqi
    Shi, Wenchang
    Qin, Bo
    Liang, Bin
    [J]. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 128 - 135