期刊文献+

嵌入式设备固件安全分析技术研究 被引量:19

Research on the Technologies of Security Analysis Technologies on the Embedded Device Firmware
下载PDF
导出
摘要 随着嵌入式设备的种类和数量的增加,设备之间日益增长的互联互通、制造商对安全的忽视、设备固件更新不及时或难以更新等,使得嵌入式设备的安全受到了严峻的考验,越来越多的设备漏洞被披露.但由于嵌入式设备种类繁多、专用性强、源码或设计文档往往不公开、运行环境受限等诸多因素的影响,通用漏洞挖掘技术无法直接适配.近年来,国内外安全专家和学者针对嵌入式设备及其固件的安全分析和测评技术提出了很多切实可行的解决方案,但缺乏详细和全面介绍最新安全研究成果的论文,使得安全分析人员难以系统地了解嵌入式设备及其固件安全分析技术的研究进展.本文围绕着当前嵌入式设备固件面临的安全风险,分析和总结了国内外最新的研究成果,并对相关安全技术进行了综合分析和评估.首先对嵌入式设备及其固件的表现形式、分类及获取方法、面临的安全攻击层面以及自动化解析情况进行了深入研究.然后,对嵌入式设备固件安全分析技术进行了细化分析,从静态分析、符号执行、二进制漏洞关联、动态分析平台和模糊测试等五个方面进行了详细分析和横向评估.最后对未来的研究方向进行了展望. With the increase of the types and numbers of the embedded devices in today’s rapidly evolving IoT(Internet of Things)era,their security faces a huge challenge because of the increasing interconnection between devices,manufactures’of neglect of the security while designing the device,the not timely(or even difficult)firmware update,and so on.More and more device vulnerabilities have been exposed in recent years,revealing that embedded devices are prone to lots of vulnerabilities.However,the characteristics of the embedded devices(such as wide variety,strong specificity,closed source and limited operating environment and so on)make the general vulnerability mining technologies inability to be directly adapted to the embedded devices.In recent years,a lot of practical and feasible solutions towards the security analysis and evaluation of the embedded devices and their firmware have been proposed by the security experts and scholars at home and abroad.But so far,there is no detailed and comprehensive survey paper about the latest security research results on the embedded devices and their firmware,which makes it difficult for the security analysis researchers to systematically understand the progress of the embedded device and its firmware security analysis technologies.Focusing on the security risks faced by the current embedded device firmware,this paper gives a survey of the latest research fruits at home and abroad,and makes a comprehensive analysis and evaluation of the related security analysis technologies.Firstly,it deeply details the manifestation,the classification and the acquisition method of the embedded device and its firmware,as well as the attack surfaces and the automated extraction methods.As it shows,the attack surface targeted at embedded device involves the entire life cycle of the embedded device,ranging from the hardware-level to the network-level,and there are many types of vulnerability,with web vulnerabilities(such as cross site scripting,command injection,authentication bypass,etc.)and memory vulnerabilities(such as deny-of-service,buffer overflow,memory corruption,etc.)even in equal proportion in the last three years.Secondly,the technologies of the security analysis on the embedded firmware have been refined and analyzed,ranging from static analysis,symbol execution,the binary vulnerability association,dynamic analysis platform to fuzzing test.The analysis shows that the research on the security analysis technology of embedded devices and their firmware has been rising gradually in recent years,and some progress has been made,especially the binary firmware vulnerability search based on AI technology and the dynamic analysis technology based on firmware re-hosting,both reflecting the fusion of the new technology and traditional security technology.However,as it shows,the embedded device firmware security analysis is still in its infancy,and there is still a lot of open work to be further studied.So,as the end of this paper,we give some interesting research directions for the researchers,such as fully/semi-automated firmware hosting and effective greybox/blackbox fuzzer towards embedded firmware.
作者 于颖超 陈左宁 甘水滔 秦晓军 YU Ying-Chao;CHEN Zuo-Ning;GAN Shui-Tao;QIN Xiao-Jun(State Key Laboratory of Mathematical Engineering and Advanced Computing,Wuxi,Jiangsu 214083;Chinese Academy of Engineering,Beijing 100088)
出处 《计算机学报》 EI CAS CSCD 北大核心 2021年第5期859-881,共23页 Chinese Journal of Computers
基金 国家“八六三”高技术研究发展计划项目基金(2018YFB1003600)资助.
关键词 嵌入式设备 固件 静态分析 符号执行 固件托管 模糊测试 embedded device firmware static analysis symbolic execution firmware re-hosting fuzzing test
  • 相关文献

参考文献5

二级参考文献22

  • 1刘奇旭,张翀斌,张玉清,张宝峰.安全漏洞等级划分关键技术研究[J].通信学报,2012,33(S1):79-87. 被引量:36
  • 2曾鸣,赵荣彩,王小芹,姚京松.一种基于反汇编技术的二进制补丁分析方法[J].计算机科学,2006,33(10):283-287. 被引量:9
  • 3谢余强,曾颖,舒辉.改进的基于图的可执行文件比较算法[J].计算机工程与设计,2007,28(2):257-260. 被引量:4
  • 4ZHANG Y, PAXSON V. Detecting backdoors[A]. USENIX Security Symposium[C], Denver, Canada, 2000. 12.
  • 5HORNG S J, SU M Y, TSAI J G. A dynamic backdoor detection system based on dynamic link libraries[J]. International Journal of Business and Systems Research, 2008, 2(3):244-257.
  • 6WYSOPAL C, ENG C, SHIELDOS T. Static detection of application backdoors[J]. Datenschutz und Datenschutz-DuD, 2010, 34(3): 149-155.
  • 7DAIS F, WEI T, ZHANG C, et al. A framework to eliminate backdoors from response computable authentication[A]. IEEE Symposium on Security and Privacy[C]. San Francisco, USA, 2012.3-17.
  • 8ELHAM S, NARGES A. Backdoor detection system using artificial neural network and genetic algorithm[A], international Conference on Computational and lntbrmation Sciences[C]. Chengdu, China, 20tl. 817-820.
  • 9HOMMES S, STATE R, ENGEL T. Detecting stealthy backdoors with association rule mining[A]. International IFIP TC 6 Conference on Networking[C]. 2012. 161-171.
  • 10GUILFANOV I. FLIRT[EB/OL]. http://www.hex-mys.com/idapro/flirt.htm.

共引文献31

同被引文献99

引证文献19

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部