Skip to main content

Research on IoT Device Vulnerability Mining Technology Based on Static Preprocessing and Coloring Analysis

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1195))

Abstract

IoT devices are playing an increasingly important role in people’s lives, and large-scale attacks on IoT devices will have serious consequences. Due to the closed nature of IoT devices, traditional vulnerability mining techniques are not directly applicable to the vulnerability mining of IoT devices. In this paper, we propose a taint-style vulnerability detection method that combines static analysis, static preprocessing, and coloring analysis. We implemented the prototype tool Aric based on this method and evaluated the tool with the real device firmware. The results show that Aric can discover the vulnerabilities in the real device firmware, with higher efficiency and lower resource occupation rate. We found multiple previously-unknown and zero-day vulnerabilities.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Meulen, R.V.D.: Gartner says 8.4 billion connected ‘things’ will be in use in 2017, up 31 percent from 2016. Gartner Newsroom (2017)

    Google Scholar 

  2. Dai, Z.: Research on the localization of firmware vulnerability based on stain tracking. J. Shandong Univ. (Nat. Sci.) 51, 41–46 (2016)

    MathSciNet  Google Scholar 

  3. Bellard, F.: QEMU, a fast and portable dynamic translator. In: USENIX Annual Technical Conference, FREENIX Track, vol. 41, p. 46 (2005)

    Google Scholar 

  4. Zaddach, J., Bruno, L., Francillon, A., et al.: AVATAR: a framework to support dynamic security analysis of embedded systems’ firmwares. In: NDSS pp. 1–16 (2014)

    Google Scholar 

  5. Chen, D.D., Woo, M., Brumley, D., et al.: Towards automated dynamic analysis for linux-based embedded firmware. In: NDSS, vol. 16, pp. 1–16 (2016)

    Google Scholar 

  6. Chen, J., Diao, W., Zhao, Q., et al.: IoTFuzzer: discovering memory corruptions in IoT through app-based fuzzing. In: NDSS (2018)

    Google Scholar 

  7. Zheng, Y., Davanian, A., Yin, H., et al.: FIRM-AFL: high-throughput greybox fuzzing of iot firmware via augmented process emulation. In: 28th {USENIX} Security Symposium ({USENIX} Security 2019), pp. 1099–1114 (2019)

    Google Scholar 

  8. Cheng, K., Li, Q., Wang, L., et al.: DTaint: detecting the taint-style vulnerability in embedded device firmware. In: 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 430–441. IEEE (2018)

    Google Scholar 

  9. Thomas, S.L., Chothia, T., Garcia, F.D.: Stringer: measuring the importance of static data comparisons to detect backdoors and undocumented functionality. In: European Symposium on Research in Computer Security, pp. 513–531. Springer, Cham (2017)

    Google Scholar 

  10. Thomas, S.L., Garcia, F.D., Chothia, T.: HumIDIFy: a tool for hidden functionality detection in firmware. In: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 279–300. Springer, Cham (2017)

    Google Scholar 

  11. Zheng, Y., Cheng, K., Li, Z., et al.: A lightweight method for accelerating discovery of taint-style vulnerabilities in embedded systems. In: International Conference on Information and Communications Security, pp. 27–36. Springer, Cham (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Baojiang Cui .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yao, M., Cui, B., Chen, C. (2021). Research on IoT Device Vulnerability Mining Technology Based on Static Preprocessing and Coloring Analysis. In: Barolli, L., Poniszewska-Maranda, A., Park, H. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing . IMIS 2020. Advances in Intelligent Systems and Computing, vol 1195. Springer, Cham. https://doi.org/10.1007/978-3-030-50399-4_25

Download citation

Publish with us

Policies and ethics