Understanding Security Risks of Embedded Devices Through Fine-Grained Firmware Fingerprinting
dc.contributor.author | Li, Qiang | en |
dc.contributor.author | Tan, Dawei | en |
dc.contributor.author | Ge, Xin | en |
dc.contributor.author | Wang, Haining | en |
dc.contributor.author | Li, Zhi | en |
dc.contributor.author | Liu, Jiqiang | en |
dc.date.accessioned | 2023-04-26T12:58:47Z | en |
dc.date.available | 2023-04-26T12:58:47Z | en |
dc.date.issued | 2022-11 | en |
dc.description.abstract | An increasing number of embedded devices are connecting to the Internet, ranging from cameras, routers to printers, while an adversary can exploit security flaws already known to compromise those devices. Security patches are usually associated with the device firmware, which relies on the device vendors and products. Due to compatibility and release-time issues, many embedded devices are still using outdated firmware with known vulnerabilities or flaws. In this article, we conduct a systematic study on device vulnerabilities by leveraging firmware fingerprints. Specifically, we use a web crawler to gather 9,716 firmware images from official websites of device vendors, and 347,685 security reports scattered across data archives, blogs, and forums. We propose to generate fine-grained fingerprints based on the subtle differences between the filesystems of various firmware images. Furthermore, machine learning algorithms and regex are used to identify device vulnerabilities and corresponding device firmware fingerprints. We perform real-world experiments to validate the performance of the firmware fingerprint, which yields high accuracy of 91% precision and 90% recall. We reveal that 6,898 reports have the firmware and related vulnerability information, and there are more than 10% of firmware vulnerabilities without any patches or solutions for mitigating underlying security risks. | en |
dc.description.notes | The work was supported in part by the National Key R&D Program of China under Grant 2018YFB0803402, in part by the National Natural Science Foundation of Chinaunder under Grant 61972024, and in part by the National Key R&D Program of China under Grant 2020YFB2103802. | en |
dc.description.sponsorship | National Key R&D Program of China [2020YFB2103802]; National Natural Science Foundation of Chinaunder [61972024] | en |
dc.description.version | Published version | en |
dc.format.mimetype | application/pdf | en |
dc.identifier.doi | https://doi.org/10.1109/TDSC.2021.3119970 | en |
dc.identifier.eissn | 1941-0018 | en |
dc.identifier.issue | 6 | en |
dc.identifier.uri | http://hdl.handle.net/10919/114798 | en |
dc.identifier.volume | 19 | en |
dc.language.iso | en | en |
dc.publisher | IEEE | en |
dc.rights | Creative Commons Attribution 4.0 International | en |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | en |
dc.subject | Security | en |
dc.subject | Internet | en |
dc.subject | Microprogramming | en |
dc.subject | Blogs | en |
dc.subject | Performance evaluation | en |
dc.subject | Fingerprint recognition | en |
dc.subject | Software | en |
dc.subject | Firmware | en |
dc.subject | fingerprinting | en |
dc.subject | embedded device | en |
dc.subject | vulnerability | en |
dc.title | Understanding Security Risks of Embedded Devices Through Fine-Grained Firmware Fingerprinting | en |
dc.title.serial | IEEE Transactions on Dependable and Secure Computing | en |
dc.type | Article - Refereed | en |
dc.type.dcmitype | Text | en |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- LiUnderstanding.pdf
- Size:
- 1.95 MB
- Format:
- Adobe Portable Document Format
- Description:
- Published version