UFO - Hidden Backdoor Discovery and Security Verification in IoT Device Firmware

被引:11
|
作者
Tien, Chin-Wei [1 ,2 ]
Tsai, Tsung-Ta [1 ]
Chen, Ing-Yi [3 ]
Kuo, Sy-Yen [2 ]
机构
[1] Inst Informat Ind, Cybersecur Technol Inst, Taipei, Taiwan
[2] Natl Taiwan Univ, Dept Elect Engn, Taipei, Taiwan
[3] Natl Taipei Univ Technol, Dept Comp Sci & Informat Engn, Taipei, Taiwan
来源
2018 29TH IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW) | 2018年
关键词
IoT Security; Firmware Security Verification; Backdoor; Vulnerability Assessment; Reverse Engineering;
D O I
10.1109/ISSREW.2018.00-37
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Recently, the use of embedded devices such as WiFi APs, IP CAM, and drones in Internet of Things (IoT) applications has become more widespread. These embedded devices are connected to networks and are often used for critical services. Thus, they receive significant attention from hackers who attempt to find a major intrusion vector in IoT applications. Hackers focus on identifying hidden backdoors in embedded devices to gain full remote access; if they gain access, they can cause significant damage to critical infrastructures. Therefore, to improve embedded device security, this study introduces Universal Firmware vulnerability Observer (UFO); UFO is a firmware vulnerability discovery system, which can automatically perform tasks such as reversing firmware embedded filesystem, identifying vulnerability, and exploring password leaks to meet the IoT firmware security verification standards, including OWASP, UL-2900, and ICSA Labs. In addition, we design a Shell Script Dependency algorithm to help identify hidden backdoor problems by discovering suspicious shell script execution paths in the extracted firmware filesystem. We use 237 real-world embedded device firmware files to evaluate UFO. The results indicate that the effectiveness of reversing firmware binary is 96%, which is significantly higher than that of open source tools. Besides, we also conclude that 73% of firmware files contain Common Vulnerabilities and Exposures in their embedded Linux kernel, 22% of firmware files can leak login passwords, and 6% of firmware files contain hidden backdoors. Moreover, we reported hidden backdoor problems to two IoT device vendors in Taiwan and received their confirmation. UFO can be successfully used for verifying firmware security and discovering hidden backdoor threats in commercial IoT devices.
引用
收藏
页码:18 / 23
页数:6
相关论文
共 50 条
  • [31] A Study on Device Security in IoT Convergence
    Kim, Hyun-Jin
    Chang, Hyun-Soo
    Suh, Jeong-Jun
    Shon, Tae-shik
    2016 INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING, MANAGEMENT SCIENCE AND APPLICATIONS (ICIMSA), 2016,
  • [32] VerificationTalk: A Verification and Security Mechanism for IoT Applications
    Shieh, Min-Zheng
    Lin, Yi-Bing
    Hsu, Yin-Jui
    SENSORS, 2021, 21 (22)
  • [33] A Survey on Verification of Security and Safety in IoT Systems
    Abuserrieh, Lobna
    Alalfi, Manar H.
    IEEE ACCESS, 2024, 12 : 138627 - 138645
  • [34] SystemC Power Profiling for IoT Device Firmware using Runtime Configurable Models
    Rudolf, Jens
    Gis, Daniel
    Stieber, Sebastian
    Haubelt, Christian
    Dorsch, Rainer
    2019 8TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2019, : 26 - 31
  • [35] Firm VEA: Vulnerability Discovery Optimisation for IoT Firmware via Version Evolution Analysis
    Yu, Bo
    Zhang, Ying
    Zhang, Yongyi
    Yang, Qiang
    Proceedings - IEEE Global Communications Conference, GLOBECOM, 2023, : 5019 - 5024
  • [36] Seum Spread: Discerning Security Flaws in IoT Firmware via Call Sequence Semantics
    Lounis, Anis
    Andreoli, Anthony
    Debbabi, Mourad
    Hanna, Aiman
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2024, 2024, 14828 : 395 - 415
  • [37] A Global IoT Device Discovery and Integration Vision
    Georgakopoulos, Dimitrios
    2019 IEEE 5TH INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC 2019), 2019, : 214 - 221
  • [38] INVITED: Formal Verification of Security Critical Hardware-Firmware Interactions in Commercial SoCs
    Ray, Sayak
    Ghosh, Nishant
    Masti, Ramya Jayaram
    Kanuparthi, Arun
    Fung, Jason M.
    PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2019,
  • [39] FITS: Inferring Intermediate Taint Sources for Effective Vulnerability Analysis of IoT Device Firmware
    Liu, Puzhuo
    Zheng, Yaowen
    Sun, Chengnian
    Qin, Chuan
    Fang, Dongliang
    Liu, Mingdong
    Sun, Limin
    PROCEEDINGS OF THE 28TH ACM INTERNATIONAL CONFERENCE ON ARCHITECTURAL SUPPORT FOR PROGRAMMING LANGUAGES AND OPERATING SYSTEMS, ASPLOS 2023, VOL 4, 2023, : 138 - 152
  • [40] Characterizing the Security Facets of IoT Device Setup
    Yang, Han
    Kuzniar, Carson
    Jiang, Chengyan
    Nikolaidis, Ioanis
    Haque, Israat
    PROCEEDINGS OF THE 2024 ACM INTERNET MEASUREMENT CONFERENCE, IMC 2024, 2024, : 612 - 621