首页> 外文会议>European symposium on research in computer security >Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic Execution
【24h】

Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic Execution

机译:通过符号执行识别IoT固件中的权限分离漏洞

获取原文
获取外文期刊封面目录资料

摘要

With the rapid proliferation of IoT devices, we have witnessed increasing security breaches targeting IoT devices. To address this, considerable attention has been drawn to the vulnerability discovery of IoT firmware. However, in contrast to the traditional firmware bugs/vulnerabilities (e.g. memory corruption), the privilege separation model in IoT firmware has not yet been systematically investigated. In this paper, we conducted an in-depth security analysis of the privilege separation model of IoT firmware and identified a previously unknown vulnerability called privilege separation vulnerability. By combining loading information extraction, library function recognition and symbolic execution, we developed Gerbil, a firmware-analysis-specific extension of the Angr framework for analyzing binaries to effectively identify privilege separation vulnerabilities in IoT firmware. So far, we have evaluated Gerbil on 106 real-world IoT firmware images (100 of which are bare-metal and RTOS-based device firmware. Gerbil have successfully detected privilege separation vulnerabilities in 69 of them. We have also verified and exploited the privilege separation vulnerabilities in several popular smart devices including Xiaomi smart gateway, Changdi smart, oven and TP-Link smart WiFi plug. Our research demonstrates that an attacker can leverage the privilege separation vulnerability to launch a border spectrum of attacks such as malicious firmware replacement and denial of service.
机译:随着物联网设备的迅速扩散,我们目睹了针对物联网设备的安全漏洞不断增加。为了解决这个问题,已经对物联网固件的漏洞发现引起了极大的关注。但是,与传统的固件错误/漏洞(例如内存损坏)相比,IoT固件中的权限分离模型尚未得到系统的研究。在本文中,我们对物联网固件的权限分离模型进行了深入的安全分析,并确定了一个以前未知的漏洞,称为权限分离漏洞。通过结合加载信息提取,库功能识别和符号执行,我们开发了Gerbil,这是Angr框架的固件分析特定扩展,用于分析二进制文件,以有效识别IoT固件中的特权分离漏洞。到目前为止,我们已经对106个真实的IoT固件映像(其中100个是裸机和基于RTOS的设备固件)进行了Gerbil评估。Gerbil已成功检测到其中的69个特权分离漏洞。我们还验证并利用了特权小米智能网关,长地智能,烤箱和TP-Link智能WiFi插头等几种流行智能设备中的隔离漏洞我们的研究表明,攻击者可以利用特权隔离漏洞发起边界频谱攻击,例如恶意固件更换和拒绝。服务。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号