Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3290480.3290491acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccnsConference Proceedingsconference-collections
research-article

Detecting Authentication-Bypass Flaws in a Large Scale of IoT Embedded Web Servers

Published: 02 November 2018 Publication History
  • Get Citation Alerts
  • Abstract

    With the rapid development of network and communication technologies, everything is able to be connected to the Internet. IoT devices, which include home routers, IP cameras, wireless printers and so on, are crucial parts facilitating to build pervasive and ubiquitous networks. As the number of IoT devices around the world increases, the security issues become more and more serious.
    To handle with the security issues and protect the IoT devices from being compromised, the firmware of devices needs to be strengthened by discovering and repairing vulnerabilities. Current vulnerability detection tools can only help strengthening traditional software, nevertheless these tools are not practical enough for IoT device firmware, because of the peculiarity in firmware's structure and embedded device's architecture. Therefore, new vulnerability detection framework is required for analyzing IoT device firmware.
    This paper reviews related works on vulnerability detection in IoT firmware, proposes and implements a framework to automatically detect authentication-bypass flaws in a large scale of Linux-based firmware. The proposed framework is evaluated with a data set of 2351 firmware images from several target vendors, which is proved to be capable of performing large-scale and automated analysis on firmware, and 1 known and 10 unknown authentication-bypass flaws are found by the analysis.

    References

    [1]
    https://en.wikipedia.org/wiki/2016_Dyn_cyberattack
    [2]
    https://techcrunch.com/2017/04/25/brickerbot-is-a-vigilante-worm-that-destroys-insecure-iot-devices/
    [3]
    https://www.theregister.co.uk/2017/04/08/brickerbot_malware_kills_iot_devices/
    [4]
    http://www.zdnet.com/article/iot-devices-will-outnumber-the-worlds-population-this-year-for-the-first-time/
    [5]
    Chen, Daming D., et al. "Towards Automated Dynamic Analysis for Linux-based Embedded Firmware." Network and Distributed System Security Symposium 2016.
    [6]
    Bojinov, Hristo, et al. "Embedded Management Interfaces: Emerging Massive Insecurity." Black Hat Usa (2009).
    [7]
    Cui, Ang, and S. J. Stolfo. "A quantitative analysis of the insecurity of embedded network devices:results of a wide-area scan." Twenty-Sixth Computer Security Applications Conference, ACSAC 2010, Austin, Texas, Usa, 6-10 December DBLP, 2010:97--106.
    [8]
    Patton, Mark, et al. "Uninvited Connections: A Study of Vulnerable Devices on the Internet of Things (IoT)." IEEE Joint Intelligence and Security Informatics Conference IEEE Computer Society, 2014:232--235.
    [9]
    https://www.shodan.io/
    [10]
    Davidson, Drew, et al. "FIE on firmware: finding vulnerabilities in embedded systems using symbolic execution." Usenix Conference on Security USENIX Association, 2013:463--478.
    [11]
    Michel, Sebastian, P. Triantafillou, and G. Weikum. "KLEE: a framework for distributed top-k query algorithms." International Conference on Very Large Data Bases, Trondheim, Norway, August 30 - September DBLP, 2005:637--648.
    [12]
    Zaddach, Jonas, et al. "AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmware." Network and Distributed System Security Symposium 2014.
    [13]
    Yan, Shoshitaishvili, et al. "Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware." Network and Distributed System Security Symposium 2015.
    [14]
    https://github.com/angr/angr
    [15]
    Costin, Andrei, J. Zaddach, and D. Balzarotti. "A large-scale analysis of the security of embedded firmware." Usenix Conference on Security Symposium USENIX Association, 2014:95--110.
    [16]
    https://github.com/misterch0c/firminator_backend
    [17]
    Costin, Andrei, and A. Zarras. "Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces." ACM on Asia Conference on Computer and Communications Security ACM, 2016:437--448.
    [18]
    Zhonghua Dai, et al. "Research on the localization of firmware vulnerability based on stain tracking." JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE))51.09(2016):41--46.
    [19]
    Wei Xie et al. "Vulnerability Detection in IoT Firmware: A Survey." International Conference on Parallel and Distributed Systems 2017, 1st IoTSec workshop.
    [20]
    http://rips-scanner.sourceforge.net/
    [21]
    http://lcamtuf.coredump.cx/afl/
    [22]
    Chipounov, Vitaly, V. Kuznetsov, and G. Candea. "The S2E Platform: Design, Implementation, and Applications." Acm Transactions on Computer Systems 30.1(2012):1--49.
    [23]
    https://scrapy.org/
    [24]
    https://github.com/ReFirmLabs/binwalk
    [25]
    F. B. et al. QEMU - Quick EMUlator. http://www.qemu.org.
    [26]
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5521
    [27]
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13071

    Cited By

    View all
    • (2022)Game of Hide-and-Seek: Exposing Hidden Interfaces in Embedded Web Applications of IoT DevicesProceedings of the ACM Web Conference 202210.1145/3485447.3512213(524-532)Online publication date: 25-Apr-2022

    Index Terms

    1. Detecting Authentication-Bypass Flaws in a Large Scale of IoT Embedded Web Servers

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      ICCNS '18: Proceedings of the 8th International Conference on Communication and Network Security
      November 2018
      166 pages
      ISBN:9781450365673
      DOI:10.1145/3290480
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 02 November 2018

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. IoT firmware
      2. Vulnerability detection
      3. automated
      4. large scale

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      ICCNS 2018

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)28
      • Downloads (Last 6 weeks)1

      Other Metrics

      Citations

      Cited By

      View all
      • (2022)Game of Hide-and-Seek: Exposing Hidden Interfaces in Embedded Web Applications of IoT DevicesProceedings of the ACM Web Conference 202210.1145/3485447.3512213(524-532)Online publication date: 25-Apr-2022

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media