IoTCID: A Dynamic Detection Technology for Command Injection Vulnerabilities in IoT Devices

被引:0
|
作者
Chen, Hao [1 ]
Ma, Jinxin [2 ]
Cui, Baojiang [1 ]
Fu, Junsong [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing, Peoples R China
[2] China Informat Technol Secur Evaluat Ctr, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Firmware vulnerability mining; command injection; dynamic detection;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The pervasiveness of IoT devices has brought us convenience as well as the risks of security vulnerabilities. However, traditional device vulnerability detection methods cannot efficiently detect command injection vulnerabilities due to heavy execution overheads or false positives and false negatives. Therefore, we propose a novel dynamic detection solution, IoTCID. First, it generates constrained models by parsing the front-end files of the IoT device, and a static binary analysis is performed towards the back-end programs to locate the interface processing function. Then, it utilizes a fuzzing method based on the feedback from Distance Function, which selects high-quality samples through various scheduling strategies. Finally, with the help of the probe code, it compares the parameter of potential risk functions with samples to confirm the command injection vulnerabilities. We implement a prototype of IoTCID and evaluate it on real-world IoT devices from three vendors and confirm six vulnerabilities. It shows that IoTCID are effective in discovering command injection vulnerabilities in IoT devices.
引用
收藏
页码:7 / 14
页数:8
相关论文
共 50 条
  • [1] Towards Automated Detection of Higher-Order Command Injection Vulnerabilities in IoT Devices: Fuzzing With Dynamic Data Flow Analysis
    Yu, Lei
    Wang, Haoyu
    Li, Linyu
    He, Houhua
    [J]. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2021, 13 (06)
  • [2] Syntactic–Semantic Detection of Clone-Caused Vulnerabilities in the IoT Devices
    Kalinin, Maxim
    Gribkov, Nikita
    [J]. Sensors, 2024, 24 (22)
  • [3] Analysis of Security Vulnerabilities for IoT Devices
    Kim, Hee-Hyun
    Yoo, Jinho
    [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2022, 18 (04): : 489 - 499
  • [4] Vulnerabilities in Hub Architecture IoT Devices
    Visan, Bogdan Alexandru
    Lee, Jiyoon
    Yang, Baijian
    Smith, Anthony H.
    Matson, Eric T.
    [J]. 2017 14TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2017, : 83 - 88
  • [5] Toward Hybrid Static-Dynamic Detection of Vulnerabilities in IoT Firmware
    He, Daojing
    Gu, Hongjie
    Li, Tinghui
    Du, Yongliang
    Wang, Xiaolei
    Zhu, Sencun
    Guizani, Nadra
    [J]. IEEE NETWORK, 2021, 35 (02): : 202 - 207
  • [6] Firmware Vulnerabilities Homology Detection Based on Clonal Selection Algorithm for IoT Devices
    He, Daojing
    Yu, Xiaohu
    Li, Tinghui
    Chan, Sammy
    Guizani, Mohsen
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (17): : 16438 - 16445
  • [7] On the impact of kernel code vulnerabilities in IoT devices
    Eresheim, Sebastian
    Luh, Robert
    Schrittwieser, Sebastian
    [J]. PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND ASSURANCE (ICSSA), 2017, : 1 - 5
  • [8] Vulnerabilities in IoT Devices for Smart Home Environment
    Costa, Luis
    Barros, Joao Paulo
    Tavares, Miguel
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2019, : 615 - 622
  • [9] REMOVING RF VULNERABILITIES FROM IOT DEVICES
    Ray, Pranab
    Sultana, Parveen H.
    Ghosh, Sushmita
    [J]. 2ND INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ADVANCED COMPUTING ICRTAC -DISRUP - TIV INNOVATION , 2019, 2019, 165 : 421 - 427
  • [10] CIVD: detection of command injection vulnerabilities in web services through aspect-oriented programming
    Shanmughaneethi, V.
    Praveen, Ra. Yagna
    Swamynathan, S.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2012, 44 (04) : 312 - 320