FirmHunter: State-Aware and Introspection-Driven Grey-Box Fuzzing towards IoT Firmware
-
Published:2021-09-29
Issue:19
Volume:11
Page:9094
-
ISSN:2076-3417
-
Container-title:Applied Sciences
-
language:en
-
Short-container-title:Applied Sciences
Author:
Yin QidiORCID,
Zhou Xu,
Zhang Hangwei
Abstract
IoT devices are exponentially increasing in all aspects of our lives. Via the web interfaces of IoT devices, attackers can control IoT devices by exploiting their vulnerabilities. In order to guarantee IoT security, testing these IoT devices to detect vulnerabilities is very important. In this work, we present FirmHunter, an automated state-aware and introspection-driven grey-box fuzzer towards Linux-based firmware images on the basis of emulation. It employs a message-state queue to overcome the dependency problem in test cases. Furthermore, it implements a scheduler collecting execution information from system introspection to drive fuzzing towards more interesting test cases, which speeds up vulnerability discovery. We evaluate FirmHunter by emulating and fuzzing eight firmware images including seven routers and one IP camera with a state-of-the-art IoT fuzzer FirmFuzz and a web application scanner ZAP. Our evaluation results show that (1) the message-state queue enables FirmHunter to parse the dependencies in test cases and find real-world vulnerabilities that other fuzzers cannot detect; (2) our scheduler accelerates the discovery of vulnerabilities by an average of 42%; and (3) FirmHunter is able to find unknown vulnerabilities.
Funder
Chinese Defense Advance Research Program of Science and Technology
Natural Science Foundation of Hunan Province
National Natural Science Foundation of China
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference33 articles.
1. IoT Connected Devices Worldwide 2030https://www.Statista.Com/statistics/802690/worldwide-Connect
2. The Search Engine for Refrigerathttps://www.shodan.io/
3. Web Application Vulnerabilities: Statistics for 2018https://www.ptsecurity.com/ww-en/analytics/web-application-vulnerabilities-statistics-2019/
4. RIPS—A Static Source Code Analyser for Vulnerabilities in PHPhttp://rips-scanner.sourceforge.net/
5. A systematic review of fuzzing techniques
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献