UFO - Hidden Backdoor Discovery and Security Verification in IoT Device Firmware

被引:11
|
作者
Tien, Chin-Wei [1 ,2 ]
Tsai, Tsung-Ta [1 ]
Chen, Ing-Yi [3 ]
Kuo, Sy-Yen [2 ]
机构
[1] Inst Informat Ind, Cybersecur Technol Inst, Taipei, Taiwan
[2] Natl Taiwan Univ, Dept Elect Engn, Taipei, Taiwan
[3] Natl Taipei Univ Technol, Dept Comp Sci & Informat Engn, Taipei, Taiwan
来源
2018 29TH IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW) | 2018年
关键词
IoT Security; Firmware Security Verification; Backdoor; Vulnerability Assessment; Reverse Engineering;
D O I
10.1109/ISSREW.2018.00-37
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Recently, the use of embedded devices such as WiFi APs, IP CAM, and drones in Internet of Things (IoT) applications has become more widespread. These embedded devices are connected to networks and are often used for critical services. Thus, they receive significant attention from hackers who attempt to find a major intrusion vector in IoT applications. Hackers focus on identifying hidden backdoors in embedded devices to gain full remote access; if they gain access, they can cause significant damage to critical infrastructures. Therefore, to improve embedded device security, this study introduces Universal Firmware vulnerability Observer (UFO); UFO is a firmware vulnerability discovery system, which can automatically perform tasks such as reversing firmware embedded filesystem, identifying vulnerability, and exploring password leaks to meet the IoT firmware security verification standards, including OWASP, UL-2900, and ICSA Labs. In addition, we design a Shell Script Dependency algorithm to help identify hidden backdoor problems by discovering suspicious shell script execution paths in the extracted firmware filesystem. We use 237 real-world embedded device firmware files to evaluate UFO. The results indicate that the effectiveness of reversing firmware binary is 96%, which is significantly higher than that of open source tools. Besides, we also conclude that 73% of firmware files contain Common Vulnerabilities and Exposures in their embedded Linux kernel, 22% of firmware files can leak login passwords, and 6% of firmware files contain hidden backdoors. Moreover, we reported hidden backdoor problems to two IoT device vendors in Taiwan and received their confirmation. UFO can be successfully used for verifying firmware security and discovering hidden backdoor threats in commercial IoT devices.
引用
收藏
页码:18 / 23
页数:6
相关论文
共 50 条
  • [1] Private Blockchain Network for IoT Device Firmware Integrity Verification and Update
    Dhakal, Samip
    Jaafar, Fehmi
    Zavarsky, Pavol
    201919TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE 2019), 2019, : 164 - 170
  • [2] A taxonomy of IoT firmware security and principal firmware analysis techniques
    Nadir, Ibrahim
    Mahmood, Haroon
    Asadullah, Ghalib
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2022, 38
  • [3] Detecting Vulnerability on IoT Device Firmware: A Survey
    Feng, Xiaotao
    Zhu, Xiaogang
    Han, Qing-Long
    Zhou, Wei
    Wen, Sheng
    Xiang, Yang
    IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2023, 10 (01) : 25 - 41
  • [4] Detecting Vulnerability on IoT Device Firmware: A Survey
    Xiaotao Feng
    Xiaogang Zhu
    Qing-Long Han
    Wei Zhou
    Sheng Wen
    Yang Xiang
    IEEE/CAAJournalofAutomaticaSinica, 2023, 10 (01) : 25 - 41
  • [5] A survey on IoT & embedded device firmware security: architecture, extraction techniques, and vulnerability analysis frameworks
    Ul Haq S.
    Singh Y.
    Sharma A.
    Gupta R.
    Gupta D.
    Discover Internet of Things, 2023, 3 (01):
  • [6] Fighting IoT Cyberattacks: Device Discovery, Attack Observation and Security Notification
    Yoshioka, Katsunari
    CPSS'22: PROCEEDINGS OF THE 8TH ACM CYBER-PHYSICAL SYSTEM SECURITY WORKSHOP, 2022, : 39 - 39
  • [7] Idols with Feet of Clay: On the Security of Bootloaders and Firmware Updaters for the IoT
    Morel, Lionel
    Courousse, Damien
    2019 17TH IEEE INTERNATIONAL NEW CIRCUITS AND SYSTEMS CONFERENCE (NEWCAS), 2019,
  • [8] Hybrid Internet of Things (IoT) data transmission security corresponding to device verification
    Jian, Ming-Shen
    Wu, Jimmy Ming-Tai
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021,
  • [9] AoT - Attack on Things: A security analysis of IoT firmware updates
    Ibrahim, Muhammad
    Continella, Andrea
    Bianchi, Antonio
    2023 IEEE 8TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P, 2023, : 1047 - 1064
  • [10] Unveiling IoT Security in Reality: A Firmware-Centric Journey
    Nino, Nicolas
    Lu, Ruibo
    Zhou, Wei
    Lee, Kyu Hyung
    Zhao, Ziming
    Guan, Le
    PROCEEDINGS OF THE 33RD USENIX SECURITY SYMPOSIUM, SECURITY 2024, 2024, : 5609 - 5626