引用本文
  • 马晓成,王允超,于洪洋,魏强.物联网设备固件安全分析现状研究综述[J].信息安全学报,已采用    [点击复制]
  • MA Xiaocheng,WANG Yunchao,YV Hongyang,WEI Qiang.An Overview of the Current Research on Embedded Device Firmware Security Analysis[J].Journal of Cyber Security,Accept   [点击复制]
【打印本页】 【下载PDF全文】 查看/发表评论下载PDF阅读器关闭

过刊浏览    高级检索

本文已被:浏览 1394次   下载 0  
物联网设备固件安全分析现状研究综述
马晓成, 王允超, 于洪洋, 魏强
0
(信息工程大学)
摘要:
随着物联网技术的发展及其应用场景的不断扩大,越来越多功能各异的物联网设备接入网络。万物互联时代到来的同时,大规模物联网设备暴露在互联网中,使得设备安全受到严峻的考验。固件是物联网设备中运行的软件,直接决定着设备的行为及功能,因此固件的安全性对保护物联网设备免受威胁至关重要。由于物联网技术分支众多且迭代迅速,针对物联网固件的安全测试研究也在不断的迭代更新。近年来,针对物联网固件的安全分析涌现了大量的研究,但缺乏专业的文献对研究现状进行及时的分析总结。本文首先梳理了物联网架构及当下设备的应用场景,然后介绍了固件的分类和通用工作框架,并讨论了固件可能面临的安全风险。基于物联网固件所面临的安全风险及其安全分析所面临的挑战,本文归纳出固件的一般流程,即总体分为固件获取、固件解包和文件提取、程序信息恢复和程序分析四个部分,并分别进行相关介绍。其中,程序分析部分是发现固件潜在问题必不可少的环节,本文从静态分析、动态环境构建及动态分析的角度进行介绍,对逆向分析、污点分析、符号执行、相似性检测、动态仿真环境构建及模糊测试等现有的固件程序分析技术进行详细分析和对比。最后总结当前工作的优势与不足,结合物联网固件的发展趋势,对未来的研究方向进行了展望。
关键词:  物联网设备  固件安全  程序分析  漏洞  污点分析  固件仿真  模糊测试
DOI:
投稿时间:2023-09-05修订日期:2023-12-26
基金项目:国家重点研发计划(2019QY0500)
An Overview of the Current Research on Embedded Device Firmware Security Analysis
MA Xiaocheng, WANG Yunchao, YV Hongyang, WEI Qiang
(Information Engineering University)
Abstract:
With the development of Internet of Things (IoT) technology and the continuous expansion of its application sce-narios, an increasing number of diverse IoT devices are being connected to networks. As the era of ubiquitous con-nectivity unfolds, a large-scale deployment of IoT devices on the Internet exposes them to significant security chal-lenges. Firmware, which is the software running on IoT devices, directly determines their behavior and functionality. Therefore, the security of firmware is crucial for protecting IoT devices from threats. Due to the numerous branches and rapid iterations of IoT technology, research on security testing for IoT firmware is also constantly being iterated and updated. In recent years, a large amount of research has emerged on the security analysis of IoT firmware, but there is a lack of professional literature to timely analyze and summarize the research status. This article first out-lines the architecture of the Internet of Things and the current application scenarios of devices, then introduces the classification and general working framework of firmware, and discusses the security risks that firmware may face. Based on the security risks faced by IoT firmware and the challenges it faces in security analysis, this article sum-marizes the general process of firmware, which is divided into four parts: firmware acquisition, firmware unpacking and file extraction, program information recovery, and program analysis, and provides relevant introductions. Among them, the program analysis part is an essential step in discovering potential firmware issues. This article in-troduces from the perspectives of static analysis, dynamic environment construction, and dynamic analysis, and provides a detailed analysis and comparison of existing firmware program analysis techniques such as reverse anal-ysis, stain analysis, symbol execution, similarity detection, dynamic simulation environment construction, and fuzz testing. Finally, the advantages and disadvantages of current work are summarized, and future research directions are discussed in combination with the development trend of IoT firmware.
Key words:  IoT devices  firmware security  program analysis  vulnerability  taint analysis  Firmware emulation  fuzzing test