UFO - Hidden Backdoor Discovery and Security Verification in IoT Device Firmware

被引:11
|
作者
Tien, Chin-Wei [1 ,2 ]
Tsai, Tsung-Ta [1 ]
Chen, Ing-Yi [3 ]
Kuo, Sy-Yen [2 ]
机构
[1] Inst Informat Ind, Cybersecur Technol Inst, Taipei, Taiwan
[2] Natl Taiwan Univ, Dept Elect Engn, Taipei, Taiwan
[3] Natl Taipei Univ Technol, Dept Comp Sci & Informat Engn, Taipei, Taiwan
来源
2018 29TH IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW) | 2018年
关键词
IoT Security; Firmware Security Verification; Backdoor; Vulnerability Assessment; Reverse Engineering;
D O I
10.1109/ISSREW.2018.00-37
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Recently, the use of embedded devices such as WiFi APs, IP CAM, and drones in Internet of Things (IoT) applications has become more widespread. These embedded devices are connected to networks and are often used for critical services. Thus, they receive significant attention from hackers who attempt to find a major intrusion vector in IoT applications. Hackers focus on identifying hidden backdoors in embedded devices to gain full remote access; if they gain access, they can cause significant damage to critical infrastructures. Therefore, to improve embedded device security, this study introduces Universal Firmware vulnerability Observer (UFO); UFO is a firmware vulnerability discovery system, which can automatically perform tasks such as reversing firmware embedded filesystem, identifying vulnerability, and exploring password leaks to meet the IoT firmware security verification standards, including OWASP, UL-2900, and ICSA Labs. In addition, we design a Shell Script Dependency algorithm to help identify hidden backdoor problems by discovering suspicious shell script execution paths in the extracted firmware filesystem. We use 237 real-world embedded device firmware files to evaluate UFO. The results indicate that the effectiveness of reversing firmware binary is 96%, which is significantly higher than that of open source tools. Besides, we also conclude that 73% of firmware files contain Common Vulnerabilities and Exposures in their embedded Linux kernel, 22% of firmware files can leak login passwords, and 6% of firmware files contain hidden backdoors. Moreover, we reported hidden backdoor problems to two IoT device vendors in Taiwan and received their confirmation. UFO can be successfully used for verifying firmware security and discovering hidden backdoor threats in commercial IoT devices.
引用
收藏
页码:18 / 23
页数:6
相关论文
共 50 条
  • [21] Research on the Technologies of Security Analysis Technologies on the Embedded Device Firmware
    Yu, Ying-Chao
    Chen, Zuo-Ning
    Gan, Shui-Tao
    Qin, Xiao-Jun
    Jisuanji Xuebao/Chinese Journal of Computers, 2021, 44 (05): : 859 - 881
  • [22] Determining the Image Base of Smart Device Firmware for Security Analysis
    Zhu, Ruijin
    Zhang, Baofeng
    Tan, Yu-an
    Wang, Jinmiao
    Wa, Yueliang
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020 (2020):
  • [23] Toward a generic and secure bootloader for IoT device firmware OTA update
    El Jaouhari, Saad
    Bouvet, Eric
    36TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2022), 2022, : 90 - 95
  • [24] IoT-DeepSense: Behavioral Security Detection of IoT Devices Based on Firmware Virtualization and Deep Learning
    Wang, Jin
    Liu, Chang
    Xu, Jiangpei
    Wang, Juan
    Hao, Shirong
    Yi, Wenzhe
    Zhong, Jing
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [25] FirmVEA: Vulnerability Discovery Optimisation for IoT Firmware via Version Evolution Analysis
    Yu, Bo
    Zhang, Ying
    Zhang, Yongyi
    Yang, Qiang
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 5019 - 5024
  • [26] IoT Device Discovery for Incidence Response
    Riggs, Caleb
    Patel, Jesal
    Gagneja, Kanwalinderjit
    PROCEEDINGS OF THE 2019 FIFTH INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV), 2019,
  • [27] Linux-based IoT Benchmark Generator For Firmware Security Analysis Tools
    de Ruck, Dairo
    Goeman, Victor
    Willocx, Michiel
    Lapon, Jorn
    Naessens, Vincent
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [28] RAM-Based Firmware Attestation for IoT Security: A Representation Learning Framework
    Iqbal, Asif
    Zia, Usman
    Aman, Muhammad Naveed
    Sikdar, Biplab
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (21): : 35124 - 35140
  • [29] Medical Device Security in the IoT Age
    Martinez, Jon B.
    2018 9TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2018, : 128 - 134
  • [30] Survey of IoT Device Security Detection
    Zhang Y.
    Li J.
    Song X.
    Fan Y.
    Lu Y.
    Zhang R.
    Wang Z.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (10): : 2271 - 2290