FirmAE - Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis.

ACSAC '20: Proceedings of the 36th Annual Computer Security Applications Conference(2020)

引用 46|浏览0
暂无评分
摘要
One approach to assess the security of embedded IoT devices is applying dynamic analysis such as fuzz testing to their firmware in scale. To this end, existing approaches aim to provide an emulation environment that mimics the behavior of real hardware/peripherals. Nonetheless, in practice, such approaches can emulate only a small fraction of firmware images. For example, Firmadyne, a state-of-the-art tool, can only run 183 (16.28%) of 1,124 wireless router/IP-camera images that we collected from the top eight manufacturers. Such a low emulation success rate is caused by discrepancy in the real and emulated firmware execution environment. In this study, we analyzed the emulation failure cases in a large-scale dataset to figure out the causes of the low emulation rate. We found that widespread failure cases often avoided by simple heuristics despite having different root causes, significantly increasing the emulation success rate. Based on these findings, we propose a technique, arbitrated emulation, and we systematize several heuristics as arbitration techniques to address these failures. Our automated prototype, Din/1AF, successfully ran 892 (79.36%) of 1,124 firmware images, including web servers, which is significantly (approximate to 4.8x) more images than that run by Firmadyne. Finally, by applying dynamic testing techniques on the emulated images, Din/1AF could check 320 known vulnerabilities (306 more than Firmadyne), and also find 12 new 0-days in 23 devices.
更多
查看译文
关键词
Firmware, embedded device, emulation, dynamic analysis
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要