首页> 外文期刊>Internet of Things Journal, IEEE >On Manually Reverse Engineering Communication Protocols of Linux-Based IoT Systems
【24h】

On Manually Reverse Engineering Communication Protocols of Linux-Based IoT Systems

机译:关于基于Linux的IOT系统手动逆向工程通信协议

获取原文
获取原文并翻译 | 示例
           

摘要

IoT security and privacy has raised grave concerns. Efforts have been made to design tools to identify and understand vulnerabilities of IoT systems. Most of the existing protocol security analysis techniques rely on a well understanding of the underlying communication protocols. In this article, we systematically present the first manual reverse engineering framework for discovering communication protocols of embedded Linux-based IoT systems. We have successfully applied our framework to reverse engineer a number of IoT systems. As an example, we present a detailed use of the framework reverse engineering the WeMo smart plug communication protocol by extracting the firmware from the flash, performing static and dynamic analysis of the firmware, and analyzing network traffic. The discovered protocol exposes severe design flaws that allow attackers to control or deny the service of victim plugs. Our manual reverse engineering framework is generic and can be applied to both read-only and writable embedded Linux filesystems.
机译:物联网安全和隐私提出了严重的担忧。已经努力设计工具来识别和理解IOT系统的漏洞。大多数现有协议安全性分析技术依赖于对底层通信协议的理解。在本文中,我们系统地提供了用于发现基于Linux的IOT系统的通信协议的第一个手动逆向工程框架。我们已成功应用于逆向工程师的框架,即多个IOT系统。例如,我们通过从Flash中提取固件,执行固件的固件,对固件进行静态和动态分析,并分析网络流量,详细使用WEMO智能插头通信协议。发现的协议暴露了严重的设计缺陷,允许攻击者控制或否认受害者插头的服务。我们的手动逆向工程框架是通用的,可以应用于只读和可写的嵌入式Linux文件系统。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号