Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security 2017
DOI: 10.5220/0006393704700477
|View full text |Cite
|
Sign up to set email alerts
|

Towards Firmware Analysis of Industrial Internet of Things (IIoT) - Applying Symbolic Analysis to IIoT Firmware Vetting

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 5 publications
0
8
0
Order By: Relevance
“…Once the malicious firmware is transferred into the targeted microcontroller, the attacker would only need the microcontroller's architecture which can be easily obtained from its manual [34]. In a reverse engineering attack, the attacker obtains the source code of the software or firmware used in the embedded device, and hence gains access to confidential information such as hard-coded credentials [35]. An attacker can also execute various malicious software (malware) to infect a given microcontroller [36].…”
Section: A Physical Layermentioning
confidence: 99%
“…Once the malicious firmware is transferred into the targeted microcontroller, the attacker would only need the microcontroller's architecture which can be easily obtained from its manual [34]. In a reverse engineering attack, the attacker obtains the source code of the software or firmware used in the embedded device, and hence gains access to confidential information such as hard-coded credentials [35]. An attacker can also execute various malicious software (malware) to infect a given microcontroller [36].…”
Section: A Physical Layermentioning
confidence: 99%
“…They evaluated the framework using 2794 malicious apps with high detection accuracy. Palavicini et al [74] performed static analysis on IoT firmware to avoid path explosion when dynamically analyzing complex binaries with symbolic execution using a software emulator. Yao et al [16] identified a previously unknown vulnerability which is known as privilege separation vulnerability.…”
Section: Related Workmentioning
confidence: 99%
“…Out of the multiple references that we reviewed, the works of Palavicini Jr. et al and Siboni et al nicely overlap with our objectives. On the one hand, Palavicini Jr. et al apply symbolic analysis to vet, in a semiautomated way, Industrial IoT (IIoT) firmware using angr , a UC Santa Barbara binary analysis framework, and Mecanical Phish , a component from the same university's cyber reasoning system, to perform semiautomated analysis of IIoT.…”
Section: Introductionmentioning
confidence: 99%