IoTCID: A Dynamic Detection Technology for Command Injection Vulnerabilities in IoT Devices

被引:0
|
作者
Chen, Hao [1 ]
Ma, Jinxin [2 ]
Cui, Baojiang [1 ]
Fu, Junsong [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing, Peoples R China
[2] China Informat Technol Secur Evaluat Ctr, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Firmware vulnerability mining; command injection; dynamic detection;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The pervasiveness of IoT devices has brought us convenience as well as the risks of security vulnerabilities. However, traditional device vulnerability detection methods cannot efficiently detect command injection vulnerabilities due to heavy execution overheads or false positives and false negatives. Therefore, we propose a novel dynamic detection solution, IoTCID. First, it generates constrained models by parsing the front-end files of the IoT device, and a static binary analysis is performed towards the back-end programs to locate the interface processing function. Then, it utilizes a fuzzing method based on the feedback from Distance Function, which selects high-quality samples through various scheduling strategies. Finally, with the help of the probe code, it compares the parameter of potential risk functions with samples to confirm the command injection vulnerabilities. We implement a prototype of IoTCID and evaluate it on real-world IoT devices from three vendors and confirm six vulnerabilities. It shows that IoTCID are effective in discovering command injection vulnerabilities in IoT devices.
引用
下载
收藏
页码:7 / 14
页数:8
相关论文
共 50 条
  • [21] A Comprehensive Survey of Attacks without Physical Access Targeting Hardware Vulnerabilities in IoT/IIoT Devices, and Their Detection Mechanisms
    Polychronou, Nikolaos-Foivos
    Thevenon, Pierre-Henri
    Puys, Maxime
    Beroulle, Vincent
    ACM Transactions on Design Automation of Electronic Systems, 2021, 27 (01):
  • [22] A Comprehensive Survey of Attacks without Physical Access Targeting Hardware Vulnerabilities in IoT/IIoT Devices, and Their Detection Mechanisms
    Polychronou, Nikolaos-Foivos
    Thevenon, Pierre-Henri
    Puys, Maxime
    Beroulle, Vincent
    ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2022, 27 (01)
  • [23] An Improved Approach for SQL Injection Vulnerabilities Detection
    Zhang, Zongzhi
    Wen, Qiaoyan
    Zhang, Zhao
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 3017 - 3020
  • [24] Identifying Vulnerabilities of Consumer Internet of Things (IoT) Devices: A Scalable Approach
    Williams, Ryan
    McMahon, Emma
    Samtani, Sagar
    Patton, Mark
    Chen, Hsinchun
    2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2017, : 179 - 181
  • [25] A Dynamic Detection Technique for XSS Vulnerabilities
    Hou, Xin-Yu
    Zhao, Xiao-Lin
    Wu, Mei-Jing
    Ma, Rui
    Chen, Yu-Peng
    2018 4TH ANNUAL INTERNATIONAL CONFERENCE ON NETWORK AND INFORMATION SYSTEMS FOR COMPUTERS (ICNISC 2018), 2018, : 34 - 43
  • [26] Design and Development of a Command-line Tool for Portable Executable File Analysis and Malware Detection in IoT Devices
    Yang, June Ho
    Ryu, Yeonseung
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (08): : 127 - 136
  • [27] Detecting Command Injection and Cross-site Scripting Vulnerabilities Using Graph Representations
    School of Electrical Engineering and Informatics, Institut Teknologi Bandung, Bandung, Indonesia
    Proc. IEEE Int. Conf. Data Softw. Eng., ICoDSE, 1600, (49-54):
  • [28] REPLIOT: A Scalable Tool for Assessing Replay Attack Vulnerabilities on Consumer IoT Devices
    Lazzaro, Sara
    De Angelis, Vincenzo
    Mandalari, Anna Maria
    Buccafurri, Francesco
    2024 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS AND OTHER AFFILIATED EVENTS, PERCOM WORKSHOPS, 2024, : 7 - 8
  • [29] A comparative analysis of Buffer Overflow vulnerabilities in High-End IoT devices
    Calatayud, Blas Molina
    Meany, Liam
    2022 IEEE 12TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2022, : 694 - 701
  • [30] Exploring the Vulnerabilities of IoT Devices: A Comprehensive Analysis of Mirai and Bashlite Attack Vectors
    Barrett, Seth
    Boswell, Bradley
    Dorai, Gokila
    2023 10TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY, IOTSMS, 2023, : 125 - 132