[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3319535.3363247acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
poster

Poster: Fuzzing IoT Firmware via Multi-stage Message Generation

Published: 06 November 2019 Publication History

Abstract

In this work, we present IoTHunter, the first grey-box fuzzer for fuzzing stateful protocols in IoT firmware. IoTHunter addresses the state scheduling problem based on a multi-stage message generation mechanism on runtime monitoring of IoT firmware. We evaluate IoTHunter with a set of real-world programs, and the result shows that IoTHunter outperforms black-box fuzzer boofuzz, which has a 2.2x, 2.0x, and 2.5x increase for function coverage, block coverage, and edge coverage, respectively. IoTHunter also found five new vulnerabilities in the firmware of home router Mikrotik, which have been reported to the vendor.

References

[1]
2019. American fuzzy lop. [Online]. http://lcamtuf.coredump.cx/afl/.
[2]
2019. Boofuzz. [Online]. https://boofuzz.readthedocs.io/en/latest/.
[3]
Andrea Biondo. 2018. Coverage-guided fuzzing of embedded firmware with avatar2. [Online]. https://siagas.math.unipd.it/siagas/getTesi.php?id=2030.
[4]
Jiongyi Chen, Wenrui Diao, Qingchuan Zhao, Chaoshun Zuo, Zhiqiang Lin, XiaoFengWang, Wing Cheong Lau, Menghan Sun, Ronghai Yang, and Kehuan Zhang. 2018. IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing. In NDSS.
[5]
Lesly-Ann Daniel, Erik Poll, and Joeri de Ruiter. 2018. Inferring OpenVPN State Machines Using Protocol State Fuzzing. In 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, 11--19.
[6]
Joeri De Ruiter and Erik Poll. 2015. Protocol State Fuzzing of TLS Implementations. In 24th USENIX Security Symposium (USENIX Security 15). 193--206.
[7]
Marius Muench, Dario Nisi, Aurélien Francillon, and Davide Balzarotti. 2018. Avatar 2: A multi-target orchestration platform. In Workshop on Binary Analysis Research (colocated with NDSS Symposium)(February 2018), BAR, Vol. 18.
[8]
Yaowen Zheng, Ali Davanian, Heng Yin, Chengyu Song, Hongsong Zhu, and Limin Sun. 2019. FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation. In 28th USENIX Security Symposium (USENIX Security 19). 1099--1114.

Cited By

View all
  • (2024)A Vulnerability Scanning Method for Web Services in Embedded FirmwareApplied Sciences10.3390/app1406237314:6(2373)Online publication date: 12-Mar-2024
  • (2024)A Survey of Protocol FuzzingACM Computing Surveys10.1145/369678857:2(1-36)Online publication date: 10-Oct-2024
  • (2024)OctopusTaint: Advanced Data Flow Analysis for Detecting Taint-Based Vulnerabilities in IoT/IIoT FirmwareProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690307(2355-2369)Online publication date: 2-Dec-2024
  • Show More Cited By

Index Terms

  1. Poster: Fuzzing IoT Firmware via Multi-stage Message Generation

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
    November 2019
    2755 pages
    ISBN:9781450367479
    DOI:10.1145/3319535
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 06 November 2019

    Check for updates

    Author Tags

    1. IoT firmware fuzzing
    2. grey-box fuzzing
    3. stateful protocol fuzzing

    Qualifiers

    • Poster

    Funding Sources

    Conference

    CCS '19
    Sponsor:

    Acceptance Rates

    CCS '19 Paper Acceptance Rate 149 of 934 submissions, 16%;
    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)98
    • Downloads (Last 6 weeks)8
    Reflects downloads up to 11 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A Vulnerability Scanning Method for Web Services in Embedded FirmwareApplied Sciences10.3390/app1406237314:6(2373)Online publication date: 12-Mar-2024
    • (2024)A Survey of Protocol FuzzingACM Computing Surveys10.1145/369678857:2(1-36)Online publication date: 10-Oct-2024
    • (2024)OctopusTaint: Advanced Data Flow Analysis for Detecting Taint-Based Vulnerabilities in IoT/IIoT FirmwareProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690307(2355-2369)Online publication date: 2-Dec-2024
    • (2024)SaTC: Shared-Keyword Aware Taint Checking for Detecting Bugs in Embedded SystemsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.330743021:4(2421-2433)Online publication date: Jul-2024
    • (2024)Labrador: Response Guided Directed Fuzzing for Black-box IoT Devices2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00127(1920-1938)Online publication date: 19-May-2024
    • (2024)FuzzFabric: A Scalable Grey-box Fuzzing Framework for Polymorphic Network Services2024 IEEE International Conference on Web Services (ICWS)10.1109/ICWS62655.2024.00139(1161-1167)Online publication date: 7-Jul-2024
    • (2024)On the (in)efficiency of fuzzing network protocolsAnnals of Telecommunications10.1007/s12243-024-01058-wOnline publication date: 13-Aug-2024
    • (2024)Green-Fuzz: Efficient Fuzzing for Network Protocol ImplementationsFoundations and Practice of Security10.1007/978-3-031-57537-2_16(253-268)Online publication date: 25-Apr-2024
    • (2024)Intelligent Zigbee Protocol Fuzzing via Constraint-Field Dependency InferenceComputer Security – ESORICS 202310.1007/978-3-031-51476-0_23(467-486)Online publication date: 11-Jan-2024
    • (2023)Automatic discovery of stateful variables in network protocol software based on replay analysis基于重放分析的网络协议软件状态变量自动化发现技术Frontiers of Information Technology & Electronic Engineering10.1631/FITEE.220027524:3(403-416)Online publication date: 27-Mar-2023
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media