IoTCID: A Dynamic Detection Technology for Command Injection Vulnerabilities in IoT Devices

被引:0
|
作者
Chen, Hao [1 ]
Ma, Jinxin [2 ]
Cui, Baojiang [1 ]
Fu, Junsong [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing, Peoples R China
[2] China Informat Technol Secur Evaluat Ctr, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Firmware vulnerability mining; command injection; dynamic detection;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The pervasiveness of IoT devices has brought us convenience as well as the risks of security vulnerabilities. However, traditional device vulnerability detection methods cannot efficiently detect command injection vulnerabilities due to heavy execution overheads or false positives and false negatives. Therefore, we propose a novel dynamic detection solution, IoTCID. First, it generates constrained models by parsing the front-end files of the IoT device, and a static binary analysis is performed towards the back-end programs to locate the interface processing function. Then, it utilizes a fuzzing method based on the feedback from Distance Function, which selects high-quality samples through various scheduling strategies. Finally, with the help of the probe code, it compares the parameter of potential risk functions with samples to confirm the command injection vulnerabilities. We implement a prototype of IoTCID and evaluate it on real-world IoT devices from three vendors and confirm six vulnerabilities. It shows that IoTCID are effective in discovering command injection vulnerabilities in IoT devices.
引用
下载
收藏
页码:7 / 14
页数:8
相关论文
共 50 条
  • [41] Effective Detection of SQL/XPath Injection Vulnerabilities in Web Services
    Antunes, Nuno
    Laranjeiro, Nuno
    Vieira, Marco
    Madeira, Henrique
    2009 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, 2009, : 260 - 267
  • [42] DYNAMIC INJECTION MNOS MEMORY DEVICES
    KONDO, R
    YATSUDA, Y
    KOYANAGI, M
    ITOH, Y
    JAPANESE JOURNAL OF APPLIED PHYSICS, 1980, 19 : 231 - 237
  • [43] Dynamic Anomaly Detection in 5G-Connected IoT Devices using Transfer Learning
    Dwedar, Mohamed
    Bayram, Fatih
    Eberhard, Jonas
    Jesser, Alexander
    2024 IEEE 3RD INTERNATIONAL CONFERENCE ON COMPUTING AND MACHINE INTELLIGENCE, ICMI 2024, 2024,
  • [44] Federated learning for malware detection in IoT devices
    Rey, Valerian
    Sanchez Sanchez, Pedro Miguel
    Huertas Celdran, Alberto
    Bovet, Gerome
    COMPUTER NETWORKS, 2022, 204
  • [45] Intelligent Mirai Malware Detection in IoT Devices
    Palla, Tarun Ganesh
    Tayeb, Shahab
    2021 IEEE WORLD AI IOT CONGRESS (AIIOT), 2021, : 420 - 426
  • [46] A fault tolerant CSA in QCA technology for IoT devices
    Saeid Seyedi
    Hatam Abdoli
    Scientific Reports, 15 (1)
  • [47] Command Detection and Classification in Tongue Drive Assistive Technology
    Sadeghian, Elnaz Banan
    Huo, Xueliang
    Ghovanloo, Maysam
    2011 ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY (EMBC), 2011, : 5465 - 5468
  • [48] Miniature Antenna for IoT Devices Using LoRa Technology
    Trinh, L. H.
    Nguyen, T. Q. K.
    Phan, D. D.
    Tran, V. Q.
    Bui, V. X.
    Truong, N. V.
    Ferrero, F.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR COMMUNICATIONS (ATC), 2017, : 170 - 173
  • [49] Key technology choices for optimal massive IoT devices
    Lundqvist, Claes
    Keränen, Ari
    Smeets, Ben
    Fornehed, John
    Azevedo, Carlos R.B.
    von Wrycza, Peter
    Ericsson Review (English Edition), 2019, 98 (01): : 48 - 59
  • [50] Cyber vulnerabilities detection system in logistics-based IoT data exchange
    Alzahrani, Ahmed
    Asghar, Muhammad Zubair
    EGYPTIAN INFORMATICS JOURNAL, 2024, 25