Proceedings 2016 Network and Distributed System Security Symposium 2016
DOI: 10.14722/ndss.2016.23415
|View full text |Cite
|
Sign up to set email alerts
|

Towards Automated Dynamic Analysis for Linux-based Embedded Firmware

Abstract: Abstract-Commercial-off-the-shelf (COTS) network-enabled embedded devices are usually controlled by vendor firmware to perform integral functions in our daily lives. For example, wireless home routers are often the first and only line of defense that separates a home user's personal computing and information devices from the Internet. Such a vital and privileged position in the user's network requires that these devices operate securely. Unfortunately, recent research and anecdotal evidence suggest that such s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
212
0
3

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 273 publications
(217 citation statements)
references
References 4 publications
2
212
0
3
Order By: Relevance
“…When emulation takes place without an in-guest component, bridging the semantic gap is necessary (see Section 7.4). In addition to analyzing personal computers, it was shown that emulation can also be used for firmware analysis [51].…”
Section: Emulationmentioning
confidence: 99%
“…When emulation takes place without an in-guest component, bridging the semantic gap is necessary (see Section 7.4). In addition to analyzing personal computers, it was shown that emulation can also be used for firmware analysis [51].…”
Section: Emulationmentioning
confidence: 99%
“…O trabalho de [Chen et al 2016] objetiva avaliar vulnerabilidades em dispositivos com kernel baseado em Linux. Para isso são executados ataques sobre firmwares emulados de dispositivos.…”
Section: Trabalhos Relacionadosunclassified
“…O sistema encontrado nesses dispositivosé projetado para executar em hardware de arquitetura específica. Para emular os dispositivos usados nos experimentos foi utilizada a ferramenta Firmadyne apresentada em [Chen et al 2016]. Firmadyneé um sistema que integra várias ferramentas para emular dispositivos baseados no kernel do sistema operacional Linux.…”
Section: Ambiente De Testesunclassified
“…irdly, static methods [16][17][18] or dynamic methods [6,15,19,20] are deployed to detect aws in these unpacked les. However, rmware-based approaches su er from known drawbacks.…”
Section: Introductionmentioning
confidence: 99%
“…ose images packed with a private file format or encrypted with a private key cannot be unpacked by these tools. For example, a prior work [19] collected 23,035 images, and it only succeeded in unpacking 8,617 images of them via existing tools. e third one is the difficulty of binary analysis due to the diversity of underlying architectures.…”
Section: Introductionmentioning
confidence: 99%