【24h】

EM-Fuzz: Augmented Firmware Fuzzing via Memory Checking

机译:EM-FUZZ:通过内存检查增强固件模糊

获取原文
获取原文并翻译 | 示例

摘要

Embedded systems are increasingly interconnected in the emerging application scenarios. Many of these applications are safety critical, making it a high priority to ensure that the systems are free from malicious attacks. This work aims to detect vulnerabilities, that could be exploited by adversaries to compromise functional correctness, in the embedded firmware, which is challenging especially due to the absence of source code. In particular, we propose EM-Fuzz, a firmware vulnerability detection technique that tightly integrates fuzzing with real-time memory checking. Based on the memory instrumentation, the firmware fuzzing can not only be guided by the traditional branch coverage to generate high-quality seeds to explore hard-to-reach regions but also by the recorded memory sensitive operations to continuously exercise sensitive regions which are prone to being attacked. More importantly, the instrumentation integrates realtime memory checkers to expose memory vulnerabilities, which is not well-supported by existing fuzzers without source code. The experiments on several real-world embedded firmware such as OpenSSL demonstrate that EM-Fuzz significantly improves the performance of state-of-the-art fuzzing tools, such as AFL and AFLFast, with the coverage improvements of 93.98% and 46.89%, respectively. Furthermore, EM-Fuzz exposes a total of 23 vulnerabilities, with an average of about 7-h per vulnerability. AFL and AFLFast together find 10 vulnerabilities, costing about 13 h and 10-h per vulnerability on average, respectively. Out of these 23 vulnerabilities, 16 are previously unknown and have been reported to the upstream product vendors, 7 of which have been assigned with unique CVE identifiers in the U.S. National Vulnerability Database.
机译:嵌入式系统在新兴应用方案中越来越多地互连。许多这些应用是安全性的,使其成为确保系统不受恶意攻击的高度优先级。这项工作旨在检测漏洞,可以通过对嵌入式固件中妥协功能正确性的对手来利用,这是挑战的挑战,特别是由于没有源代码。特别是,我们提出了EM-Fuzz,一种固件漏洞检测技术,用实时内存检查紧密集成模糊。基于内存仪器,固件模糊不仅可以由传统的分支覆盖率引导,以产生高质量的种子来探索难以达到的地区,而且还通过记录的内存敏感操作来连续运动敏感区域被攻击。更重要的是,仪器集成了实时内存检查器以暴露内存漏洞,该漏洞是不受源代码的现有模糊的完全支持。 openssl等几个真实嵌入式固件的实验表明,EM-FIZZ显着提高了最先进的模糊工具(如AFL和AFLFAST)的性能,分别覆盖范围93.98%和46.89% 。此外,EM-FIZZZ总共暴露23个漏洞,平均每种漏洞约为7-H. AFL和AFLFAST共同找到了10个漏洞,分别为平均漏洞的13小时和10-H.在这23个漏洞中,16个以前未知,并已向上游产品供应商报告,其中7个已在美国国家漏洞数据库中分配有唯一的CVE标识符。

著录项

  • 来源
  • 作者单位

    Tsinghua Univ Sch Software Beijing Natl Res Ctr Informat Sci & Technol Beijing 100084 Peoples R China|Tsinghua Univ Minist Educ Key Lab Informat Syst Secur Beijing 100084 Peoples R China;

    Tsinghua Univ Sch Software Beijing Natl Res Ctr Informat Sci & Technol Beijing 100084 Peoples R China|Tsinghua Univ Minist Educ Key Lab Informat Syst Secur Beijing 100084 Peoples R China;

    Tsinghua Univ Sch Software Beijing Natl Res Ctr Informat Sci & Technol Beijing 100084 Peoples R China|Tsinghua Univ Minist Educ Key Lab Informat Syst Secur Beijing 100084 Peoples R China;

    Nanjing Univ Aeronaut & Astronaut Coll Comp Sci & Technol Nanjing 211106 Peoples R China;

    Univ York Dept Comp Sci York YO10 5DD N Yorkshire England;

    Villanova Univ Dept Elect & Comp Engn Villanova PA 19085 USA;

    Tsinghua Univ Sch Software Beijing Natl Res Ctr Informat Sci & Technol Beijing 100084 Peoples R China|Tsinghua Univ Minist Educ Key Lab Informat Syst Secur Beijing 100084 Peoples R China;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Embedded firmware; guided fuzzing; memory checking; vulnerability;

    机译:嵌入式固件;引导模糊;记忆检查;漏洞;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号