首页> 外文会议>Annual IEEE/IFIP International Conference on Dependable Systems and Networks >DTaint: Detecting the Taint-Style Vulnerability in Embedded Device Firmware
【24h】

DTaint: Detecting the Taint-Style Vulnerability in Embedded Device Firmware

机译:DTaint:检测嵌入式设备固件中的污染样式漏洞

获取原文

摘要

A rising number of embedded devices are reachable in the cyberspace, such as routers, cameras, printers, etc. Those devices usually run firmware whose code is proprietary with few public documents. Furthermore, most of the firmware images cannot be analyzed in dynamic analysis due to various hardware-specific peripherals. As a result, it hinders traditional static analysis and dynamic analysis techniques. In this paper, we propose a static binary analysis approach, DTaint, to detect taint-style vulnerabilities in the firmware. The taint-style vulnerability is a typical class of weakness, where the input data reaches a sensitive sink through an unsafe path. Specifically, we generate data dependency in a bottom-up manner through traversing callees before callers. To reduce the influence of the binary firmware, DTaint identifies pointer aliasing, interprocedural data flow, and similarity of the data structure layout. We have implemented a prototype of DTaint and conducted experiments to evaluate its performance. Our results show that DTaint discovers more vulnerabilities in less time, compared with the existing techniques. Furthermore, we illustrate the effectiveness of DTaint through applying it over six firmware images from four manufacturers. We have found 21 vulnerabilities, where 13 of them are previously-unknown and zero-day vulnerabilities.
机译:网络空间中越来越多的嵌入式设备可以访问,例如路由器,相机,打印机等。这些设备通常运行固件,其固件专有的代码很少公开。此外,由于各种特定于硬件的外围设备,大多数固件映像无法在动态分析中进行分析。结果,它阻碍了传统的静态分析和动态分析技术。在本文中,我们提出了一种静态二进制分析方法DTaint,以检测固件中的异味样式漏洞。异味式漏洞是典型的弱点类别,其中输入数据通过不安全的路径到达敏感的接收器。具体来说,我们通过在调用者之前遍历被调用者,以自下而上的方式生成数据依赖性。为了减少二进制固件的影响,DTaint标识指针别名,过程间数据流以及数据结构布局的相似性。我们已经实现了DTaint的原型,并进行了实验以评估其性能。我们的结果表明,与现有技术相比,DTaint可以在更短的时间内发现更多漏洞。此外,我们通过将DTaint应用于来自四个制造商的六个固件映像中来说明其有效性。我们发现了21个漏洞,其中13个是以前未知的零日漏洞。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号