UFO - Hidden Backdoor Discovery and Security Verification in IoT Device Firmware

被引:11
|
作者
Tien, Chin-Wei [1 ,2 ]
Tsai, Tsung-Ta [1 ]
Chen, Ing-Yi [3 ]
Kuo, Sy-Yen [2 ]
机构
[1] Inst Informat Ind, Cybersecur Technol Inst, Taipei, Taiwan
[2] Natl Taiwan Univ, Dept Elect Engn, Taipei, Taiwan
[3] Natl Taipei Univ Technol, Dept Comp Sci & Informat Engn, Taipei, Taiwan
来源
2018 29TH IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW) | 2018年
关键词
IoT Security; Firmware Security Verification; Backdoor; Vulnerability Assessment; Reverse Engineering;
D O I
10.1109/ISSREW.2018.00-37
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Recently, the use of embedded devices such as WiFi APs, IP CAM, and drones in Internet of Things (IoT) applications has become more widespread. These embedded devices are connected to networks and are often used for critical services. Thus, they receive significant attention from hackers who attempt to find a major intrusion vector in IoT applications. Hackers focus on identifying hidden backdoors in embedded devices to gain full remote access; if they gain access, they can cause significant damage to critical infrastructures. Therefore, to improve embedded device security, this study introduces Universal Firmware vulnerability Observer (UFO); UFO is a firmware vulnerability discovery system, which can automatically perform tasks such as reversing firmware embedded filesystem, identifying vulnerability, and exploring password leaks to meet the IoT firmware security verification standards, including OWASP, UL-2900, and ICSA Labs. In addition, we design a Shell Script Dependency algorithm to help identify hidden backdoor problems by discovering suspicious shell script execution paths in the extracted firmware filesystem. We use 237 real-world embedded device firmware files to evaluate UFO. The results indicate that the effectiveness of reversing firmware binary is 96%, which is significantly higher than that of open source tools. Besides, we also conclude that 73% of firmware files contain Common Vulnerabilities and Exposures in their embedded Linux kernel, 22% of firmware files can leak login passwords, and 6% of firmware files contain hidden backdoors. Moreover, we reported hidden backdoor problems to two IoT device vendors in Taiwan and received their confirmation. UFO can be successfully used for verifying firmware security and discovering hidden backdoor threats in commercial IoT devices.
引用
收藏
页码:18 / 23
页数:6
相关论文
共 50 条
  • [41] Formal Verification of an Efficient Architecture to Enhance the Security in IoT
    Elsayed, Eman K.
    Diab, L. S.
    Ibrahim, Asmaa A.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (03) : 134 - 139
  • [42] Computing Security Scores for IoT Device Vulnerabilities
    Rizvi, Syed
    McIntyre, Nicholas
    Ryoo, Jungwoo
    2019 INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND ASSURANCE (ICSSA 2019), 2019, : 52 - 59
  • [43] The Mirai Botnet and the Importance of IoT Device Security
    Eustis, Alexander G.
    16TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY-NEW GENERATIONS (ITNG 2019), 2019, 800 : 85 - 89
  • [44] Formal verification for security and attacks in IoT physical layer
    Toman Z.H.
    Hamel L.
    Toman S.H.
    Graiet M.
    Valadares D.C.G.
    Journal of Reliable Intelligent Environments, 2024, 10 (1) : 73 - 91
  • [45] IoT Device Security the Hard(ware) way
    Schuss, Markus
    Iber, Johannes
    Dobaj, Jurgen
    Kreiner, Christian
    Boano, Carlo Alberto
    Roemer, Kay
    EUROPLOP 2018: PROCEEDINGS OF THE 23RD EUROPEAN CONFERENCE ON PATTERN LANGUAGES OF PROGRAMS, 2018,
  • [46] Device Verification and Compatibility for Heterogeneous Semantic IoT Systems
    Suman, Sukhavasi
    Perumal, Thinagaran
    Mustapha, Norwati
    Yaakob, Razali
    2019 4TH INTERNATIONAL CONFERENCE AND WORKSHOPS ON RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE): THRIVING TECHNOLOGIES, 2019,
  • [47] Advancements Towards Global IoT Device Discovery and Integration
    Dawod, Anas
    Georgakopoulos, Dimitrios
    Jayaraman, Prem Prakash
    Nirmalathas, Ampalavanapillai
    2019 IEEE INTERNATIONAL CONGRESS ON INTERNET OF THINGS (IEEE ICIOT 2019), 2019, : 147 - 155
  • [48] Hidden mobile terminal device discovery in a UWB environment
    Park, Sanghoon
    Larson, Lawrence E.
    Milstein, Laurence B.
    2006 IEEE INTERNATIONAL CONFERENCE ON ULTRA-WIDEBAND, VOLS 1 AND 2, 2006, : 481 - +
  • [49] Formal Security Verification of Concurrent Firmware in SoCs using Instruction-Level Abstraction for Hardware
    Huang, Bo-Yuan
    Ray, Sayak
    Gupta, Aarti
    Fung, Jason M.
    Malik, Sharad
    2018 55TH ACM/ESDA/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2018,
  • [50] Verification and modeling of IoT time automata for gateway security system
    Kamakshi, P.
    Bhavani, Y.
    Bhaskar, A.
    Kumar, B. Kiran
    Kumar, T. Mahesh
    SOFT COMPUTING, 2022, 26 (10) : 4915 - 4928