【24h】

XCS based hidden firmware modification on embedded devices

机译:在嵌入式设备上基于XCS的隐藏固件修改

获取原文
获取外文期刊封面目录资料

摘要

Most contemporary embedded devices, such as wireless routers, digital cameras, and digital photo frames, have Web based management interfaces that allow an administrator to perform management tasks on the device from a Web browser connecting to the device's Web server. It has been shown earlier that many of these devices are vulnerable to Cross Site Scripting type attacks whereby some malicious JavaScript code can be injected in the Web pages stored on the device. When such infected pages are opened by the administrator, the malicious script is executed with admin privileges, and it can potentially fully compromise the embedded device. In this paper, we demonstrate that such full compromise of embedded devices is indeed possible in practice by showing how the injected malicious script can install an arbitrarily modified firmware on the device. We present the general framework of this kind of hidden firmware modification attacks, and report on our proof-of-concept implementation that targets Planex MZK-W04NU wireless routers. In addition, we also show how this vulnerability can be exploited to install botnet clients on embedded devices, and by doing so, to create embedded botnets. Our work proves that the risk of this type of attacks on embedded systems is considerable, and it will further increase in the future.
机译:大多数现代嵌入式设备(例如无线路由器,数码相机和数码相框)都具有基于Web的管理界面,该界面允许管理员从连接到设备Web服务器的Web浏览器在设备上执行管理任务。前面已经表明,这些设备中的许多设备都容易受到跨站点脚本类型的攻击,从而可以将一些恶意JavaScript代码注入到设备上存储的网页中。当管理员打开此类受感染的页面时,该恶意脚本将以管理员权限执行,并且可能潜在地完全破坏嵌入式设备。在本文中,我们通过展示注入的恶意脚本如何在设备上安装任意修改的固件,证明了实际上可以对嵌入式设备进行完全折衷。我们介绍了这种隐藏的固件修改攻击的一般框架,并报告了针对Planex MZK-W04NU无线路由器的概念验证实施。此外,我们还展示了如何利用此漏洞在嵌入式设备上安装僵尸网络客户端,并以此创建嵌入式僵尸网络。我们的工作证明,对嵌入式系统进行此类攻击的风险相当大,并且将来还会进一步增加。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号