首页> 外文会议>International conference on smart card research and advanced applications >Opening Pandora's Box: Effective Techniques for Reverse Engineering IoT Devices
【24h】

Opening Pandora's Box: Effective Techniques for Reverse Engineering IoT Devices

机译:打开Pandora的盒子:逆向工程IoT设备的有效技术

获取原文

摘要

With the growth of the Internet of Things, many insecure embedded devices are entering into our homes and businesses. Some of these web-connected devices lack even basic security protections such as secure password authentication. As a result, thousands of IoT devices have already been infected with malware and enlisted into malicious bot-nets and many more are left vulnerable to exploitation. In this paper we analyze the practical security level of 16 popular IoT devices from high-end and low-end manufacturers. We present several low-cost black-box techniques for reverse engineering these devices, including software and fault injection based techniques for bypassing password protection. We use these techniques to recover device firmware and passwords. We also discover several common design flaws which lead to previously unknown vulnerabilities. We demonstrate the effectiveness of our approach by modifying a laboratory version of the Mirai botnet to automatically include these devices. We also discuss how to improve the security of IoT devices without significantly increasing their cost.
机译:随着物联网的发展,许多不安全的嵌入式设备正在进入我们的家庭和企业。这些与网络连接的设备中有些甚至没有基本的安全保护措施,例如安全密码验证。结果,成千上万的物联网设备已经感染了恶意软件,并加入了恶意的僵尸网络,还有更多易受利用。在本文中,我们分析了来自高端和低端制造商的16种流行的IoT设备的实际安全级别。我们提出了几种低成本的黑盒技术来对这些设备进行逆向工程,包括绕过密码保护的基于软件和故障注入的技术。我们使用这些技术来恢复设备固件和密码。我们还发现了一些常见的设计缺陷,这些缺陷导致了以前未知的漏洞。通过修改实验室版本的Mirai僵尸网络以自动包含这些设备,我们展示了我们方法的有效性。我们还将讨论如何在不显着增加成本的情况下提高IoT设备的安全性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号