Abstract
Cyberattacks targeting vulnerabilities in the internet of things (IoT) devices are increasing in number annually. Accordingly, various methods and analysis tools for IoT vulnerability detection have been proposed. Each analysis tool focuses on a specific vulnerability; therefore, it is necessary to use different analysis tools to detect multiple vulnerabilities. However, the currently available analysis tools often suffer from installation errors and are difficult to use effectively. Therefore, we propose a middleware for static analysis of IoT firmware that can be equipped with multiple vulnerability-detection algorithms. Using our middleware, multiple vulnerability-detection algorithms can be combined into a single analysis tool. Our results were compared with those of Karonte, the most popular analysis tool in terms of capability.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
M. Alsheikh, L. Konieczny, M. Prater, G. Smith, and S. Uludag, “The state of iot security: Unequivocal appeal to cybercriminals, onerous to defenders,” IEEE Consumer Electronics Magazine, vol. 11, no. 3, pp. 59–68, 2022.
N. Redini, A. MacHiry, R. Wang, C. Spensky, A. Continella, Y. Shoshitaishvili, C. Kruegel, and G. Vigna, “Karonte: Detecting insecure multi-binary interactions in embedded firmware,” in Proc. 2020 IEEE Symposium on Security and Privacy, Online, May. 2020, pp. 1544–1561.
J. Yun, F. Rustamov, J. Kim, and Y. Shin, “Fuzzing of embedded systems: A survey,” ACM Comput. Surv., vol. 55, no. 7, pp. 1–33, 2022. [Online]. Available: https://doi.org/10.1145/3538644.
X. Feng, X. Zhu, Q.-L. Han, W. Zhou, S. Wen, and Y. Xiang, “Detecting vulnerability on iot device firmware: A survey,” IEEE/CAA Journal of Automatica Sinica, vol. 10, no. 1, pp. 25–41, 2023.
P. Ferrara, A. K. Mandal, A. Cortesi, and F. Spoto, “Static analysis for discovering iot vulnerabilities,” Int. J. Softw. Tools Technol. Transf., vol. 23, no. 1, p. 71–88, 2021. [Online]. Available: https://doi.org/10.1007/s10009-020-00592-x.
S. L. Thomas, T. Chothia, and F. D. Garcia, “Stringer: Measuring the importance of static data comparisons to detect backdoors and undocumented functionality,” in Proc. 22nd European Symposium on Research in Computer Security, Copenhagen, Denmark, Sept. 2017, pp. 513–531.
M. Yoda, S. Sakuraba, Y. Sei, Y. Tahara, and A. Ohsuga, “Detection of the hardcoded login information from socket and string compare symbols,” 2021 Annals of Emerging Technologies in Computing, vol. 5, no. 1, pp. 28–39, 2021.
M. Yoda, S. Sakuraba, Y. Sei, Y. Tahara, and A. Ohsuga, “Detection of the hardcoded login information from socket symbols,” in Proc. 3rd IEEE International Conference on Computing, Electronics & Communications Engineering, Essex, United Kingdom, Aug. 2020, pp. 33–38.
M. Yoda, S. Sakuraba, Y. Sei, Y. Tahara, and A. Ohsuga, “Detecting hardcoded login information from user input,” in Proc. IEEE 41st International Conference on Consumer Electronics, Oct. 2022, pp. 104–105.
J. Zhang, M. Ma, P. Wang, and X. dong Sun, “Middleware for the internet of things: A survey on requirements, enabling technologies, and solutions,” Journal of Systems Architecture, vol. 117, p. 102098, 2021. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S1383762121000795.
M. Yoda, “Yoda,” https://github.com/usaribbon/firmddle_docker, accessed on May. 05. 2023. [Online]. Available: https://github.com/usaribbon/firmddle_docker.
Y. Shoshitaishvili, R. Wang, C. Hauser, C. Kruegel, and G. Vigna, “Firmalice - automatic detection of authentication bypass vulnerabilities in binary firmware.” in Proc. 22rd Annual Network and Distributed System Security Symposium, San Diego, USA, Feb. 2015.
L. Cojocar, J. Zaddach, R. Verdult, H. Bos, A. Francillon, and D. Balzarotti, “PIE: parser identification in embedded systems,” in Proc. the 31st Annual Computer Security Applications Conference, Los Angeles, USA, Dec. 2015, pp. 251–260.
K. Cheng, Q. Li, L. Wang, Q. Chen, Y. Zheng, L. Sun, and Z. Liang, “Dtaint: Detecting the taint-style vulnerability in embedded device firmware,” Luxembourg, Luxembourg, 2018, pp. 430–441.
Y. David, N. Partush, and E. Yahav, “Firmup: Precise static detection of common vulnerabilities in firmware,” in Proc. the Twenty-Third International Conference on Architectural Support for Programming Languages and Operating Systems, New York, USA, Mar. 2018, p. 392–404.
T. S. John, T. Thomas, and S. Emmanuel, “Graph convolutional networks for android malware detection with system call graphs,” in Proc. Third ISEA Conference on Security and Privacy, Guwahati, India, Feb. 2020, pp. 162–170.
D. D. Chen, M. Woo, D. Brumley, and M. Egele, “Towards automated dynamic analysis for linux-based embedded firmware,” in Proc. 23rd Annual Network and Distributed System Security Symposium, San Diego, USA, Feb. 2016.
D. D. Chen, M. Woo, D. Brumley, and M. Egele, “Firmadyne,” https://github.com/firmadyne/firmadyne, accessed on May. 05. 2023. [Online]. Available: https://github.com/firmadyne/firmadyne.
S. L. Thomas, T. Chothia, and F. D. Garcia, “Stringer,” https://github.com/BaDSeED-SEC/strngr, accessed on May. 05. 2023. [Online]. Available: https://github.com/BaDSeED-SEC/strngr.
S. L. Thomas, T. Chothia, and F. D. Garcia, “Humidify: A tool for hidden functionality detection in firmware,” in Proc. 24rd Annual Network and Distributed System Security Symposium, San Diego, USA, Feb. 2017, pp. 279–300.
S. L. Thomas, T. Chothia, and F. D. Garcia, “Humidify,” https://github.com/BaDSeED-SEC/HumIDIFy, accessed on May. 05. 2023. [Online]. Available: https://github.com/BaDSeED-SEC/HumIDIFy.
P. Srivastava, H. Peng, J. Li, H. Okhravi, H. Shrobe, and M. Payer, “Firmfuzz: Automated iot firmware introspection and analysis,” in Proc. the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, London, United Kingdom, Nov. 2019, p. 15–21.
P. Srivastava, H. Peng, J. Li, H. Okhravi, H. Shrobe, and M. Payer, “Firmfuzz,” https://github.com/HexHive/FirmFuzz, accessed on May. 05. 2023. [Online]. Available: https://github.com/HexHive/FirmFuzz.
N. Redini, A. MacHiry, R. Wang, C. Spensky, A. Continella, Y. Shoshitaishvili, C. Kruegel, and G. Vigna, “Karonte,” https://hub.docker.com/r/badnack/karonte, accessed on May. 05. 2023. [Online]. Available: https://hub.docker.com/r/badnack/karonte.
J. Collake, “Firmware mod kit,” https://github.com/amitv87/firmware-mod-kit, accessed on May. 05. 2023. [Online]. Available: https://github.com/amitv87/firmware-mod-kit.
Z. Zhang, Y. Ye, W. You, G. Tao, W.-c. Lee, Y. Kwon, Y. Aafer, and X. Zhang, “Osprey: Recovery of variable and data structure via probabilistic analysis for stripped binary,” in Proc. the 42nd IEEE Symposium on Security and Privacy, San Francisco, USA, May. 2021, pp. 813–832.
C. Pang, R. Yu, D. Xu, E. Koskinen, G. Portokalidis, and J. Xu, “Towards optimal use of exception handling information for function detection,” in Proc. 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Online, 2021, pp. 338–349.
M. Antonakakis, T. April, M. Bailey, M. Bernhard, E. Bursztein, J. Cochran, Z. Durumeric, J. A. Halderman, L. Invernizzi, M. Kallitsis, D. Kumar, C. Lever, Z. Ma, J. Mason, D. Menscher, C. Seaman, N. Sullivan, K. Thomas, and Y. Zhou, “Understanding the mirai botnet,” in Proc. the 26th USENIX Security Symposium, Vancouver, Canada, Aug. 2017. [Online]. Available: https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/antonakakis.
Acknowledgements
This work was supported by JSPS KAKENHI Grant Numbers JP21H03496, JP22K12157, JP23H03688 and SEI Group CSR Foundation.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Yoda, M., Nakamura, S., Sei, Y., Tahara, Y., Ohsuga, A. (2024). A Scalable Middleware for IoT Vulnerability Detection. In: Lee, R. (eds) Networking and Parallel/Distributed Computing Systems. Studies in Computational Intelligence, vol 1125. Springer, Cham. https://doi.org/10.1007/978-3-031-53274-0_7
Download citation
DOI: https://doi.org/10.1007/978-3-031-53274-0_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-53273-3
Online ISBN: 978-3-031-53274-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)