skip to main content
10.1145/3333165.3333169acmotherconferencesArticle/Chapter ViewAbstractPublication PagesarabwicConference Proceedingsconference-collections
research-article

Firmware Update Attacks and Security for IoT Devices: Survey

Authors Info & Claims
Published:07 March 2019Publication History

ABSTRACT

The increasing vulnerabilities found in Internet of Things (IoT) devices have raised the need for a solid mechanism of securing the firmware update of these connected objects, since firmware updates are one way to patch vulnerabilities and add security features. This survey analyses the types of attacks that target the firmware update operation in IoT devices and the available secure firmware update methods for IoT devices in the literature between 2004 and 2018. In addition, several popular firmware analysis and vulnerability detection tools are presented. We believe this paper will open the possibility for firmware analysis, attacks and security and therefore help researchers to develop new mechanisms to protect the embedded systems.

References

  1. L. Da Xu, W. He, and S. Li, "Internet of things in industries: A survey," IEEE Trans. Ind. informatics, vol. 10, no. 4, pp. 2233--2243, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  2. S. M. Chowdhury, A. Hossain, and S. Debnath, "Impact of Error Control Code on Characteristic Distance in Wireless Sensor Network," Wirel. Pers. Commun., 2017. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. L. Kvarda, P. Hnyk, L. Vojtech, and M. Neruda, "Software implementation of secure firmware update in IoT concept," Adv. Electr. Electron. Eng., vol. 15, no. 4 Special Issue, pp. 626--632, 2017.Google ScholarGoogle Scholar
  4. S. Schmidt, M. Tausig, M. Hudler, and G. Simhandl, "Secure Firmware Update Over the Air in the Internet of Things Focusing on Flexibility and Feasibility Proposal for a Design," in Internet of Things Software Update Workshop (IoTSU), At Dublin, 2016, no. June.Google ScholarGoogle Scholar
  5. H. Mansor, K. Markantonakis, R. N. Akram, and K. Mayes, "Don't Brick Your Car: Firmware Confidentiality and Rollback for Vehicles," in Availability, Reliability and Security (ARES), 2015 10th International Conference, IEEE, 2015, pp. 139--148. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. T. Rad, "Vulnerabilities in Correctional Facilities," 2011.Google ScholarGoogle Scholar
  7. Dronebl, "Network Bluepill," 2008.Google ScholarGoogle Scholar
  8. B. Jack, "Jackpotting Automated Teller Machines Redux," Black Hat USA, 2010.Google ScholarGoogle Scholar
  9. C. Miller, "Battery firmware hacking," Black Hat USA, pp. 3--4, 2011.Google ScholarGoogle Scholar
  10. A. Costin, "PostScript(um--you've been hacked)," 28C3, 2011.Google ScholarGoogle Scholar
  11. A. Cui, M. Costello, and S. J. Stolfo, "When Firmware Modifications Attack: A Case Study of Embedded Exploitation," 2013.Google ScholarGoogle Scholar
  12. Z. Ling, J. Luo, Y. Xu, C. Gao, K. Wu, and X. Fu, "Security Vulnerabilities of Internet of Things: A Case Study of the Smart Plug System," IEEE Internet Things J., vol. 4, no. 6, pp. 1899--1909, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  13. C. Hawk, J. Hyland, R. Rupert, M. Colonvega, and S. Hall, "Defending Against Firmware Cyber Attacks on Safety-Critical Systems," Chiropr. Osteopat., vol. 14, no. 1, p. 3, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  14. J. Rieck, "Attacks on Fitness Trackers Revisited: A Case-Study of Unfit Firmware Security," pp. 33--44, 2016.Google ScholarGoogle Scholar
  15. H. A. Abdul-ghani, D. Konstantas, and M. Mahyoub, "A Comprehensive IoT Attacks Survey based on a Building-blocked Reference Model," no. April, 2018.Google ScholarGoogle Scholar
  16. G. Jurković and V. Sruk, "Remote firmware update for constrained embedded systems," 2014 37th Int. Conv. Inf. Commun. Technol. Electron. Microelectron. MIPRO 2014 - Proc., no. May, pp. 1019--1023, 2014.Google ScholarGoogle Scholar
  17. H. Yaling, "The design of monitoring system based on GPRS," pp. 1--4, 2016.Google ScholarGoogle Scholar
  18. S. Dalai, B. Chatterjee, D. Dey, S. Chakravorti, and K. Bhattacharya, "Microcontroller based remote updating system using voice channel of cellular network," 2015 IEEE Power, Commun. Inf. Technol. Conf., pp. 11--16, 2015.Google ScholarGoogle Scholar
  19. B. C. Choi, S. H. Lee, J. C. Na, and J. H. Lee, "Secure firmware validation and update for consumer devices in home networking," IEEE Trans. Consum. Electron., vol. 62, no. 1, pp. 39--44, 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. P. G. Zaware, "Wireless Monitoring, Controlling and Firmware upgradation of embedded devices using Wi-Fi," pp. 2--7, 2014.Google ScholarGoogle Scholar
  21. S. G. Hong, N. S. Kim, and T. Heo, "A smartphone connected software updating framework for IoT devices," Proc. Int. Symp. Consum. Electron. ISCE, vol. 2015--Augus, pp. 2--3, 2015.Google ScholarGoogle Scholar
  22. T. Thanh, T. H. Vu, N. Van Cuong, and P. N. Nam, "A protocol for secure remote update of run-time partially reconfigurable systems based on FPGA," 2013 Int. Conf. Control. Autom. Inf. Sci. ICCAIS 2013, no. November 2013, pp. 295--299, 2013.Google ScholarGoogle Scholar
  23. S. Schmidt, M. Tausig, M. Hudler, and G. Simhandl, "Secure Firmware Update Over the Air in the Internet of Things Focusing on Flexibility and Feasibility," no. August, 2016.Google ScholarGoogle Scholar
  24. A. Seshadri, M. Luk, A. Perrig, L. van Doorn, and P. Khosla, "SCUBA: Secure Code Update By Attestation in sensor networks," WiSe '06 Proc. 5th ACM Work. Wirel. Secur., 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. D. Perito and G. Tsudik, "Secure code update for embedded devices via proofs of secure erasure," in Springer, 2010.Google ScholarGoogle Scholar
  26. G. O. Karame and W. Li, "Secure erasure and code update in legacy sensors," in Springer, 2015.Google ScholarGoogle Scholar
  27. N. Karvelas and A. Kiayias, "Efficient proofs of secure erasure," SCN, Springer, 2014.Google ScholarGoogle Scholar
  28. N. Asokan, T. Nyman, A. Sadeghi, G. Tsudik, and T. U. Darmstadt, "ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices," IEEE.Google ScholarGoogle Scholar
  29. B. L. B, S. Malik, S. Wi, and J. Lee, "Firmware Verification of Embedded Devices Based on a Blockchain," Springer, vol. 199, pp. 52--61, 2017.Google ScholarGoogle Scholar
  30. B. L. J. Lee, "Blockchain-based secure firmware update for embedded devices in an Internet of Things environment," J. Supercomput. Springer, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. A. Yohan, N. Lo, and S. Achawapong, "Blockchain-based Firmware Update Framework for Internet-of-Things Environment," in Conf. Information and Knowledge Engineering, pp. 151--155.Google ScholarGoogle Scholar
  32. G. Gabriel, R. Roy, and S. B. R. Kumar, "International Conference on Computer Networks and Communication Technologies," in International Conference on Computer Networks and Communication Technologies, Springer (to appear), 2019, vol. 15, pp. 671--679.Google ScholarGoogle Scholar
  33. Y. Gupta, R. Shorey, D. Kulkarni, and J. Tew, "The Applicability of Blockchain in the Internet of Things," pp. 561--564.Google ScholarGoogle Scholar
  34. "Awesome Firmware Security." {Online}. Available: https://github.com/PreOS-Security/awesome-firmware-security/blob/master/README.md.Google ScholarGoogle Scholar
  35. "Binwalk." {Online}. Available: https://github.com/ReFirmLabs/binwalk.Google ScholarGoogle Scholar
  36. A. Cui, "Embedded Device Firmware Vulnerability Hunting Using FRAK," Black Hat USA, 2012.Google ScholarGoogle Scholar
  37. "FACT." {Online}. Available: https://github.com/fkie-cad/FACT_core.Google ScholarGoogle Scholar
  38. D. D. Chen, M. Egele, M. Woo, and D. Brumley, "Towards Automated Dynamic Analysis for Linux-based Embedded Firmware," no. February, pp. 21--24, 2016.Google ScholarGoogle Scholar
  39. "Firmware Mod Kit." {Online}. Available: https://github.com/rampageX/firmware-mod-kit/wiki.Google ScholarGoogle Scholar
  40. "Firmwalker." {Online}. Available: https://github.com/craigz28/firmwalker.Google ScholarGoogle Scholar
  41. Attify, "Firmware Analysis Toolkit." {Online}. Available: https://github.com/attify/firmware-analysis-toolkit.Google ScholarGoogle Scholar
  42. "BIN2BMP." {Online}. Available: https://sourceforge.net/projects/bin2bmp/files/bin2bmp/.Google ScholarGoogle Scholar
  43. "Radare2." {Online}. Available: https://github.com/radare/radare2.Google ScholarGoogle Scholar
  44. "IDA." {Online}. Available: https://hex-rays.com/.Google ScholarGoogle Scholar
  45. "Firminator." {Online}. Available: https://github.com/misterch0c/firminator_backend.Google ScholarGoogle Scholar
  46. J. Zaddach, L. Bruno, and D. Balzarotti, "Avatar: A Framework to Support Dynamic Security Analysis of Embedded Systems ' Firmwares."Google ScholarGoogle Scholar
  47. D. Davidson, T. Ristenpart, and W. Madison, "F IE on Firmware: Finding Vulnerabilities in Embedded Systems using Symbolic Execution."Google ScholarGoogle Scholar
  48. "Firmware.Re." {Online}. Available: http://firmware.re/.Google ScholarGoogle Scholar
  49. Y. David and E. Yahav, "FirmUp: Precise Static Detection of Common Vulnerabilities in Firmware," ASPLOS'18, 2018. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. "Angr." {Online}. Available: https://github.com/angr/angr.Google ScholarGoogle Scholar
  51. "ReFirm Labs." {Online}. Available: https://www.refirmlabs.com/.Google ScholarGoogle Scholar

Index Terms

  1. Firmware Update Attacks and Security for IoT Devices: Survey

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            ArabWIC 2019: Proceedings of the ArabWIC 6th Annual International Conference Research Track
            March 2019
            136 pages
            ISBN:9781450360890
            DOI:10.1145/3333165

            Copyright © 2019 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 7 March 2019

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed limited

            Acceptance Rates

            ArabWIC 2019 Paper Acceptance Rate20of36submissions,56%Overall Acceptance Rate20of36submissions,56%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader