Nothing Special   »   [go: up one dir, main page]

Skip to main content

IoTaint: An Optimized Static Taint Analysis Method in Embedded Firmware

  • Conference paper
  • First Online:
Advances in Internet, Data & Web Technologies (EIDWT 2024)

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 193))

Included in the following conference series:

  • 596 Accesses

Abstract

While IoT devices have created immense value for human life, they have also introduced unavoidable security risks. In recent years, attacks targeting IoT devices have become increasingly common, making the use of efficient and automated methods for discovering vulnerabilities in IoT devices a popular research direction. However, current vulnerability detection techniques face issues such as high false positive rates and huge time costs. Therefore, this paper introduces a prototype system for IoT device vulnerability detection, IoTaint, which is based on an optimized taint analysis method. IoTaint identifies tainted data sources by analyzing shared keywords between front-end and back-end files, tracks taint analysis across border binary and inter-files, and checks sink points of dangerous data. With low latency and low false positive rates, it is achieved by optimization strategies to efficiently identify vulnerabilities in IoT device firmware. Not only does IoTaint perform well in detecting Nday and 1day vulnerabilities, but it is also capable of discovering 0day vulnerabilities, for which are confirmed by CVE/CNNVD.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Chen, J, et al.: IOTFUZZER: discovering memory corruptions in iot through app-based fuzzing. In: Network and Distributed Systems Security (NDSS) Symposium 2018. Network and Distributed Systems Security (NDSS) Symposium 2018, San Diego, California, United States, 18 February 2018

    Google Scholar 

  2. Zhang, Y., et al.: SRFuzzer: an automatic fuzzing framework for physical SOHO router devices to discover multi-type vulnerabilities. In: Proceedings of the 35th Annual Computer Security Applications Conference, pp. 544–556, December 2019

    Google Scholar 

  3. Chen, D.D., Woo, M., Brumley, D., Egele, M.: Towards automated dynamic analysis for Linux-based embedded firmware. In: NDSS, vol. 1, p. 1, February 2016

    Google Scholar 

  4. Zheng, Y., Davanian, A., Yin, H., Song, C., Zhu, H., Sun, L.: FIRM-AFL: high-throughput greybox fuzzing of IoT firmware via augmented process emulation. In: 28th USENIX Security Symposium (USENIX Security 2019), pp. 1099–1114 (2019)

    Google Scholar 

  5. Cadar, C., Sen, K.: Symbolic execution for software testing: three decades later. Commun. ACM 56(2) (2013)

    Google Scholar 

  6. Redini, N., et al.: KARONTE: detecting insecure multi-binary interactions in embedded firmware. In: 2020 IEEE Symposium on Security and Privacy (SP), pp. 1544–1561. IEEE, May 2020

    Google Scholar 

  7. Srivastava, P., Peng, H., Li, J., Okhravi, H., Shrobe, H., Payer, M.: FirmFuzz: automated IoT firmware introspection and analysis. In: Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, pp. 15–21, November 2019

    Google Scholar 

  8. Chen, L., et al.: Sharing more and checking less: leveraging common input keywords to detect bugs in embedded systems. In: 30th USENIX Security Symposium (USENIX Security 2021), pp. 303–319 (2021)

    Google Scholar 

  9. Cheng, K., et al.: Finding taint-style vulnerabilities in Linux-based embedded firmware with SSE-based alias analysis (2021). arXiv preprint arXiv:2109.12209

  10. Bellard, F.: QEMU, a fast and portable dynamic translator. In: USENIX Annual Technical Conference, FREENIX Track, vol. 41 (2005)

    Google Scholar 

  11. Wang, F., Shoshitaishvili, Y.: Angr-the next generation of binary analysis. In: 2017 IEEE Cybersecurity Development (SecDev). IEEE (2017)

    Google Scholar 

  12. Gartner Says 5.8 Billion Enterprise and Automotive IoT Endpoints Will Be in Use (2020). https://www.gartner.com/en/newsroom/press-releases/2019-08-29-gartner-says-5-8-billion-enterprise-and-automotive-io

  13. Palo Alto Networks: 2020 Unit 42 IoT Threat Report (2020). https://iotbusinessnews.com/download/white-papers/UNIT42-IoT-Threat-Report.pdf

  14. Khandelwal, S.: Thousands of MikroTik Routers Hacked to Eavesdrop on Network Traffic (2018). https://thehackernews.com/2018/09/mikrotik-router-hacking.html

  15. Michał, Z.: American Fuzzy Lop. Retrieved 1 September 2022. https://lcamtuf.coredump.cx/afl/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Baojiang Cui .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yu, H., Cui, B. (2024). IoTaint: An Optimized Static Taint Analysis Method in Embedded Firmware. In: Barolli, L. (eds) Advances in Internet, Data & Web Technologies. EIDWT 2024. Lecture Notes on Data Engineering and Communications Technologies, vol 193. Springer, Cham. https://doi.org/10.1007/978-3-031-53555-0_12

Download citation

Publish with us

Policies and ethics