首页> 外文学位 >A taxonomy of firmware extraction methodologies.
【24h】

A taxonomy of firmware extraction methodologies.

机译:固件提取方法的分类法。

获取原文
获取原文并翻译 | 示例

摘要

The ability to quickly validate embedded device firmware is crucial to maintaining the integrity of mission-critical systems. Extracting firmware from embedded devices for validation currently requires significant time and resources, and the devices are often destroyed during the extraction process. The taxonomy of firmware extraction methods presented in this dissertation provides a standard technique for evaluating firmware extraction methods in order to identify the ideal extraction method for an embedded device in a scenario of interest. The taxonomy serves as a managerial component in the larger framework of digital forensic research. The ability to easily compare firmware extraction methods provides an organization or individual the ability to analyze a situation, allocate time and resources appropriately, and validate decisions made in the laboratory.;This dissertation presents the motivation for embedded device security, background information about embedded devices and embedded device firmware, and five firmware extraction case studies. This information is used to develop and clarify the taxonomy described in this research. An example of the taxonomy usage is presented, and the taxonomy is evaluated to demonstrate that it satisfies the key requirements of a taxonomy. Test subjects representing the digital forensic community, for whom the taxonomy is developed, used the taxonomy to classify firmware extraction methods identified in three embedded device hardware analyses and employed in three scenarios. Their results demonstrate that the taxonomy has well defined terms and is comprehensible, unambiguous, mutually exclusive, generally repeatable, useful, and accepted.
机译:快速验证嵌入式设备固件的能力对于维护关键任务系统的完整性至关重要。从嵌入式设备中提取固件以进行验证目前需要大量时间和资源,并且在提取过程中经常会损坏这些设备。本文提出的固件提取方法的分类法为评估固件提取方法提供了一种标准技术,以便在感兴趣的场景中确定嵌入式设备的理想提取方法。在更大范围的数字法证研究框架中,分类法是管理的组成部分。轻松比较固件提取方法的能力为组织或个人提供了分析情况,适当分配时间和资源并验证实验室中做出的决定的能力。本论文提出了嵌入式设备安全性的动机,有关嵌入式设备的背景信息和嵌入式设备固件,以及五个固件提取案例研究。该信息用于开发和阐明本研究中描述的分类法。给出了分类法用法的一个示例,并对分类法进行了评估,以证明其满足分类法的关键要求。代表数字法医界的测试对象(针对其开发了分类法)使用分类法对在三种嵌入式设备硬件分析中确定并在三种情况下使用的固件提取方法进行分类。他们的结果表明,分类法具有明确的术语,并且易于理解,明确,互斥,通常可重复,有用并被接受。

著录项

  • 作者单位

    The University of Tulsa.;

  • 授予单位 The University of Tulsa.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2014
  • 页码 191 p.
  • 总页数 191
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号