Security analysis method for firmware of embedded equipment

A technology of embedded devices and analysis methods, applied in computer security devices, platform integrity maintenance, instruments, etc., can solve problems such as poor compatibility, failure to identify network configuration device initialization, etc.

Active Publication Date: 2020-07-17
XIDIAN UNIV
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this method solves the problem of being unable to perform dynamic analysis, experiments show that the compatibility of this solution is not good, and it cannot recognize the correct network configuration or complete the initialization of the device for firmware from many manufacturers.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security analysis method for firmware of embedded equipment
  • Security analysis method for firmware of embedded equipment
  • Security analysis method for firmware of embedded equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0095] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Obviously, the described embodiments are part of the embodiments of the present invention, not all of them. the embodiment. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0096] A security analysis method for embedded device firmware of the present invention comprises the following steps:

[0097] Step 1: Statically analyze the file system of the embedded device firmware, find the parameters and configuration files used to start the service daemon (Service Daemon), and package the file system of the embedded device firmware into a virtual machine disk...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security analysis method for firmware of embedded equipment, which comprises the following steps: 1, carrying out static analysis on a file system of the firmware of the embedded equipment, searching parameters and configuration files used for starting a service daemon, and packaging the file system of the firmware of the embedded equipment into a disk mirror image of a virtual machine; 2, starting a service daemon by utilizing the searched parameters and the configuration file, and recording an execution track of the service daemon; if yes, executing the step 5, otherwise, executing the step 3; 3, searching for a reason why the service daemon cannot be started according to the recorded execution track of the service daemon; 4, repairing the service daemon according to the searched reason why the service daemon cannot be started, and executing the step 2 after repairing; and 5, testing the started network service. According to the method, more types of embedded equipment firmware are supported, and various pieces of operation semantic information in the firmware program running process are obtained for safety analysis.

Description

technical field [0001] The invention belongs to the technical field of software security protection, and in particular relates to a security analysis method for embedded device firmware. Background technique [0002] With the development of the Internet and electronic technology, various types of "Internet of Things" embedded devices have become more and more popular and spread throughout people's lives. However, limited by device manufacturers' update policies and users' usage habits, the security of these devices is often not taken seriously, and they often run outdated or vulnerable firmware programs. Most of these devices play an important role in their working network environment, such as the access device and gateway exit of the local area network, and sometimes may even grasp some important or private information of users. Once the security defenses of these devices are breached, there may be serious consequences. [0003] For a long time, the traditional research a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/52G06F21/57
CPCG06F21/577G06F21/575G06F21/52
Inventor 吴华茂周亚金李金库
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products