Towards Automated Dynamic Analysis for Linux-based Embedded Firmware

被引:167
|
作者
Chen, Daming D. [1 ]
Egele, Manuel [2 ]
Woo, Maverick [1 ]
Brumley, David [1 ]
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
[2] Boston Univ, Boston, MA 02215 USA
关键词
D O I
10.14722/ndss.2016.23415
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Commercial-off-the-shelf (COTS) network-enabled embedded devices are usually controlled by vendor firmware to perform integral functions in our daily lives. For example, wireless home routers are often the first and only line of defense that separates a home user's personal computing and information devices from the Internet. Such a vital and privileged position in the user's network requires that these devices operate securely. Unfortunately, recent research and anecdotal evidence suggest that such security assumptions are not at all upheld by the devices deployed around the world. A first step to assess the security of such embedded device firmware is the accurate identification of vulnerabilities. However, the market offers a large variety of these embedded devices, which severely impacts the scalability of existing approaches in this area. In this paper, we present FIRMADYNE, the first automated dynamic analysis system that specifically targets Linux-based firmware on network-connected COTS devices in a scalable manner. We identify a series of challenges inherent to the dynamic analysis of COTS firmware, and discuss how our design decisions address them. At its core, FIRMADYNE relies on software-based full system emulation with an instrumented kernel to achieve the scalability necessary to analyze thousands of firmware binaries automatically. We evaluate FIRMADYNE on a real-world dataset of 23,035 firmware images across 42 device vendors gathered by our system. Using a sample of 74 exploits on the 9,486 firmware images that our system can successfully extract, we discover that 887 firmware images spanning at least 89 distinct products are vulnerable to one or more of the sampled exploit(s). This includes 14 previously-unknown vulnerabilities that were discovered with the aid of our framework, which affect 69 firmware images spanning at least 12 distinct products. Furthermore, our results show that 11 of our tested attacks affect firmware images from more than one vendor, suggesting that code-sharing and common upstream manufacturers (OEMs) are quite prevalent.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] Detecting Vulnerabilities in Linux-Based Embedded Firmware with SSE-Based On-Demand Alias Analysis
    Cheng, Kai
    Zheng, Yaowen
    Liu, Tao
    Guan, Le
    Liu, Peng
    Li, Hong
    Zhu, Hongsong
    Ye, Kejiang
    Sun, Limin
    [J]. PROCEEDINGS OF THE 32ND ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2023, 2023, : 360 - 372
  • [2] Linux-based IoT Benchmark Generator For Firmware Security Analysis Tools
    de Ruck, Dairo
    Goeman, Victor
    Willocx, Michiel
    Lapon, Jorn
    Naessens, Vincent
    [J]. 18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [3] Detecting command injection vulnerabilities in Linux-based embedded firmware with LLM-based taint analysis of library functions
    Ye, Junjian
    Fei, Xincheng
    de Carnavalet, Xavier de Carne
    Zhao, Lianying
    Wu, Lifa
    Zhang, Mengyuan
    [J]. COMPUTERS & SECURITY, 2024, 144
  • [4] Design and Application of Linux-Based Embedded Systems
    Sun, Chunling
    [J]. ADVANCES IN MULTIMEDIA, SOFTWARE ENGINEERING AND COMPUTING, VOL 1, 2011, 128 : 641 - 645
  • [5] An Instrumentation System for an Embedded Linux-Based Flight Controller
    Don, Michael
    Schomer, Nathan
    Grabner, Mitchell
    Miller, Cory
    Hallameyer, Jonathan
    [J]. 2022 IEEE AUTOTESTCON, 2022,
  • [6] A linux-based automated data collection system for moorings
    Gaither, CC
    Shaumeyer, JN
    Young, PH
    Borden, JM
    [J]. OCEAN COMMUNITY CONFERENCE'98: CELEBRATING 1998 INTERNATIONAL YEAR OF THE OCEAN, PROCEEDINGS VOLS 1 AND 2, 1998, : 185 - 189
  • [7] Work-in-Progress: Introspection of the Linux-based Embedded Firmwares
    Dovgalyuk, Pavel
    Fursova, Natalia
    Vasiliev, Ivan
    Makarov, Vladimir
    [J]. 2018 PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE (EMSOFT), 2018,
  • [8] Measuring and Minimizing Interrupt Latency in Linux-Based Embedded Systems
    Rybaniec, Radoslaw
    Wieczorek, Piotr Z.
    [J]. PHOTONICS APPLICATIONS IN ASTRONOMY, COMMUNICATIONS, INDUSTRY, AND HIGH-ENERGY PHYSICS EXPERIMENTS 2012, 2012, 8454
  • [9] Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces
    Costin, Andrei
    Zarras, Apostolis
    Francillon, Aurelien
    [J]. ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 437 - 448
  • [10] Towards Automated Classification of Firmware Images and Identification of Embedded Devices
    Costin, Andrei
    Zarras, Apostolis
    Francillon, Aurelien
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2017, 2017, 502 : 233 - 247