Embedded-device-oriented firmware vulnerability detection method and embedded-device-oriented firmware vulnerability detection system

A technology for embedded devices and vulnerability detection, which is applied in the fields of instruments, electrical digital data processing, platform integrity maintenance, etc., to achieve the effect of improving speed, accuracy and robustness

Active Publication Date: 2017-01-04
INST OF INFORMATION ENG CAS
View PDF4 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the code modular design and open source sharing, embedded firmware vulnerabilities have the characteristics of strong correlation, that is, the vulnerabilities of a certain function that exist in one fir

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Embedded-device-oriented firmware vulnerability detection method and embedded-device-oriented firmware vulnerability detection system
  • Embedded-device-oriented firmware vulnerability detection method and embedded-device-oriented firmware vulnerability detection system
  • Embedded-device-oriented firmware vulnerability detection method and embedded-device-oriented firmware vulnerability detection system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The present invention will be described in detail below in conjunction with specific embodiments.

[0039] The overall block diagram of the method is as follows figure 1 shown. include:

[0040] a) Use a web crawler to regularly crawl the firmware published by each manufacturer on its firmware update website, and store it in the firmware library;

[0041] b) Identify the device information of the firmware in the firmware library, if the device information of the firmware is not in the knowledge base, continue to step c), otherwise, query the encoding algorithm and the instruction set used for the firmware from the knowledge base and then jump to step d);

[0042] Embedded devices of the same manufacturer and product series often have the same encoding algorithm, have the same processor, and use the same instruction set. The knowledge base mainly saves the mapping relationship between the manufacturer's product series and the coding algorithm instruction set.

[004...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an embedded-device-oriented firmware vulnerability detection method and an embedded-device-oriented firmware vulnerability detection system, and relates to vulnerability discovery and analysis of firmware of embedded devices. By the method and the system, relevance among functions in the firmware can be utilized, and discovered firmware vulnerabilities are spread to other firmware automatically. The method mainly includes the steps of firmware crawling and vulnerability collection, equipment information extraction, firmware decoding and disassembling, fingerprint extracting and matching of functions, vulnerability verification and the like. The method and the device have the advantages that both matching speed and matching accuracy are taken into consideration through coordination between attribute counting type fingerprints and structure measurement type fingerprints, used fingerprint characteristics have features of trans-complier and trans-processor platforms, and accordingly, high robustness during matching is guaranteed.

Description

technical field [0001] The invention relates to the field of vulnerability mining and analysis, in particular to a firmware vulnerability detection method and system for embedded devices. Background technique [0002] With the steady advancement of the Internet of Things and Industry 4.0, embedded devices are widely used in production and life, and play an increasingly important role. However, due to the general lack of security awareness among traditional embedded device manufacturers, vulnerabilities related to embedded firmware have been continuously exposed in recent years. The devices involved in these vulnerabilities include industrial controllers, security cameras, routers, digital phones, car controllers, and more. Security incidents caused by embedded firmware vulnerabilities are also constantly being reported. The current vulnerability mining method for embedded devices mainly relies on manually mining the firmware of a specific device. However, due to code modu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06F21/57
CPCG06F21/563G06F21/577
Inventor 石志强陈昱孙利民朱红松
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products