Affiliation:
1. Concordia University, Canada
2. Thales Canada Inc., Canada
3. Institut de recherche d’Hydro-Québec, Canada
Abstract
In the era of the internet of things (IoT), software-enabled inter-connected devices are of paramount importance. The embedded systems are very frequently used in both security and privacy-sensitive applications. However, the underlying software (a.k.a. firmware) very often suffers from a wide range of security vulnerabilities, mainly due to their outdated systems or reusing existing vulnerable libraries; which is evident by the surprising rise in the number of attacks against embedded systems. Therefore, to protect those embedded systems, detecting the presence of vulnerabilities in the large pool of embedded devices and their firmware plays a vital role. To this end, there exist several approaches to identify and trigger potential vulnerabilities within deployed embedded systems firmware. In this survey, we provide a comprehensive review of the state-of-the-art proposals, which detect vulnerabilities in embedded systems and firmware images by employing various analysis techniques, including static analysis, dynamic analysis, symbolic execution, and hybrid approaches. Furthermore, we perform both quantitative and qualitative comparisons among the surveyed approaches. Moreover, we devise taxonomies based on the applications of those approaches, the features used in the literature, and the type of the analysis. Finally, we identify the unresolved challenges and discuss possible future directions in this field of research.
Funder
Hydro-Québec
Thales Group
Natural Sciences and Engineering Research Council of Canada
Publisher
Association for Computing Machinery (ACM)
Subject
General Computer Science,Theoretical Computer Science
Reference154 articles.
1. A Taxonomy of Software Integrity Protection Techniques
2. A Novel Concolic Execution Approach on Embedded Device
3. Analysis of embedded applications by evolutionary fuzzing
4. Magnus Almgren Davide Balzarotti Jan Stijohann and Emmanuele Zambon. 2014. D5.3 report on automated vulnerability discovery techniques. CRISALIS EU Project. https://docplayer.net/53692826-D5-3-report-on-automated-vulnerability-discovery-techniques.html. Magnus Almgren Davide Balzarotti Jan Stijohann and Emmanuele Zambon. 2014. D5.3 report on automated vulnerability discovery techniques. CRISALIS EU Project. https://docplayer.net/53692826-D5-3-report-on-automated-vulnerability-discovery-techniques.html.
5. SIGMA: A Semantic Integrated Graph Matching Approach for identifying reused functions in binary code
Cited by
35 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献