一种基于导向式模糊测试的IoT设备固件漏洞分析方法
作者:
作者单位:

作者简介:

通讯作者:

潘祖烈,男,1976年生,博士,教授,研究方向为网络空间安全E-mail:panzulie17@nudt.edu.cn

中图分类号:

TP311

基金项目:

国家重点研发计划资助项目(2017YFB0802900)


Vulnerability analysis method for Internet of Things device firmware based on guided fuzzing
Author:
Affiliation:

Fund Project:

  • 摘要
  • |
  • 图/表
  • |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • |
  • 引证文献
  • |
  • 资源附件
  • |
  • 文章评论
    摘要:

    为提高物联网(Internet of Things, IoT)设备漏洞分析的准确度,在深入分析了50余个MIPS架构的IoT设备固件漏洞的基础上,提出了一种基于导向式模糊测试的动静结合IoT设备固件漏洞分析方法。获取固件程序中所有函数信息,依据数据引入函数与漏洞触发函数的函数调用关系图,定位危险代码区域。基于危险代码区域详细控制流图,计算执行路径中基本块到达漏洞触发函数的距离,动态调控种子能量,实现面向漏洞触发函数的导向性模糊测试。设计实现了面向MIPS架构的IoT设备固件漏洞分析系统DirFirmFuzz。实验结果表明,相较于已有工具,系统漏洞分析的误报率平均缩减了73.31%,到达漏洞触发函数的平均速度加快了1.1~7倍。同时,在实际环境测试过程中,发现了D-Link、Cisco等多个厂商的12个0-day漏洞,均已报送相关厂商进行修补。

    Abstract:

    To increase the accuracy of vulnerability analysis of Internet of Things (IoT) device firmware, an in-depth analysis of more than 50 IoT device firmware vulnerabilities of the MIPS architecture was performed, and a firmware vulnerability analysis combining dynamic and static method based on guided fuzzing was proposed. All the function information in the firmware program was obtained, and the dangerous code area was located according to function call graph of data introducing function and dangerous function. The detailed control flow diagram of dangerous code area was used to calculate the distance from the basic block to vulnerability trigger function, and the seed energy was dynamically adjused to achieve the guided fuzzing of the vulnerability trigger function. The DirFirmFuzz, a firmware vulnerability analysis system for IoT devices based on MIPS architecture was designed and implemented. The experimental results showed that comparing with the existing methods, the false alarm rate of system vulnerability analysis could be reduced by 73.31% on average, and the average speed of DirFirmFuzz to reach the vulnerability trigger function was 1.1~7 times faster than that of the existing tools. At the same time, during the real world testing, 12 0-day vulnerabilities from multiple vendors such as D-Link and Cisco were discovered, and all of them have been reported to relevant vendors for patching.

    参考文献
    相似文献
    引证文献
引用本文
分享
文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:2022-05-09
  • 最后修改日期:2022-06-04
  • 录用日期:
  • 在线发布日期: 2023-05-04
  • 出版日期: