2021
DOI: 10.1007/978-3-030-78120-0_6
|View full text |Cite
|
Sign up to set email alerts
|

Automatic Inference of Taint Sources to Discover Vulnerabilities in SOHO Router Firmware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…SaTC [12] proposes utilizing shared keyword-aware taint checking to track user input data flow between the front end and back end. Researchers like Liu Lingxiang [13] and Cheng Kai [14] have suggested identifying external data input functions to increase analytical precision. Through our analysis of the associations between the front end and back end, we deduced that boundary binary files, which facilitate data interactions with the front end, exhibit salient HTTP service-related characteristics.…”
Section: Challenges and Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…SaTC [12] proposes utilizing shared keyword-aware taint checking to track user input data flow between the front end and back end. Researchers like Liu Lingxiang [13] and Cheng Kai [14] have suggested identifying external data input functions to increase analytical precision. Through our analysis of the associations between the front end and back end, we deduced that boundary binary files, which facilitate data interactions with the front end, exhibit salient HTTP service-related characteristics.…”
Section: Challenges and Methodsmentioning
confidence: 99%
“…Nevertheless, this approach overlooks the fact that user input data are ingested via data import functions, leading to a substantial number of false positives in the analysis. Liu et al [13] and Cheng et al [14] have researched the identification of these external data import functions and have proposed relevant identification techniques.…”
Section: Static Analysis-based Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…In this paper, we focus on taint-style vulnerabilities [5], [11], [4], [3] in Linux-based IoT devices. Figure 1 depicts the scene of taint-style vulnerability: An attacker can access the target device over a local or wide area network and send arbitrary data to the device with no restriction.…”
Section: A Threat Modelmentioning
confidence: 99%
“…In contrast, static analysis has fewer application preconditions that do not depend on a complicated execution environment. Thus, several works utilize static analysis to detect vulnerabilities in firmware [5], [26], [3], [4], [29].…”
Section: Static Analysis In Firmwarementioning
confidence: 99%