【24h】

Research on IoT Device Vulnerability Mining Technology Based on Static Preprocessing and Coloring Analysis

机译:基于静态预处理和着色分析的IOT设备漏洞挖掘技术研究

获取原文

摘要

IoT devices are playing an increasingly important role in people's lives, and large-scale attacks on IoT devices will have serious consequences. Due to the closed nature of IoT devices, traditional vulnerability mining techniques are not directly applicable to the vulnerability mining of IoT devices. In this paper, we propose a taint-style vulnerability detection method that combines static analysis, static preprocessing, and coloring analysis. We implemented the prototype tool Aric based on this method and evaluated the tool with the real device firmware. The results show that Aric can discover the vulnerabilities in the real device firmware, with higher efficiency and lower resource occupation rate. We found multiple previously-unknown and zero-day vulnerabilities.
机译:IoT设备在人们的生活中发挥着越来越重要的作用,对物联网设备的大规模攻击将产生严重后果。 由于IOT设备的封闭性,传统的漏洞挖掘技术不可直接适用于IOT设备的漏洞挖掘。 在本文中,我们提出了一种污染脆弱性检测方法,该方法结合了静态分析,静态预处理和着色分析。 我们基于此方法实现了原型工具aric,并评估了具有真实设备固件的工具。 结果表明,ARIC可以发现Real Device固件中的漏洞,效率更高,资源占用率更低。 我们发现了多种以前未知和零日漏洞。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号