Towards Automated Classification of Firmware Images and Identification of Embedded Devices
Costin, A., Zarras, A., & Francillon, A. (2017). Towards Automated Classification of Firmware Images and Identification of Embedded Devices. In S. De Capitani di Vimercati, & F. Martinelli (Eds.), ICT Systems Security and Privacy Protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings (pp. 233-247). Springer. IFIP Advances in Information and Communication Technology, 502. https://doi.org/10.1007/978-3-319-58469-0_16
Julkaistu sarjassa
IFIP Advances in Information and Communication TechnologyPäivämäärä
2017Tekijänoikeudet
© IFIP International Federation for Information Processing 2017. This is a final draft version of an article whose final and definitive form has been published by Springer. Published in this repository with the kind permission of the publisher.
Embedded systems, as opposed to traditional computers,
bring an incredible diversity. The number of devices manufactured is constantly
increasing and each has a dedicated software, commonly known
as firmware. Full firmware images are often delivered as multiple releases,
correcting bugs and vulnerabilities, or adding new features. Unfortunately,
there is no centralized or standardized firmware distribution
mechanism. It is therefore difficult to track which vendor or device a firmware
package belongs to, or to identify which firmware version is used in
deployed embedded devices. At the same time, discovering devices that
run vulnerable firmware packages on public and private networks is crucial
to the security of those networks. In this paper, we address these
problems with two different, yet complementary approaches: firmware
classification and embedded web interface fingerprinting. We use supervised
Machine Learning on a database subset of real world firmware files.
For this, we first tell apart firmware images from other kind of files and
then we classify firmware images per vendor or device type. Next, we
fingerprint embedded web interfaces of both physical and emulated devices.
This allows recognition of web-enabled devices connected to the
network. In some cases, this complementary approach allows to logically
link web-enabled online devices with the corresponding firmware package
that is running on the devices. Finally, we test the firmware classification
approach on 215 images with an accuracy of 93.5%, and the device
fingerprinting approach on 31 web interfaces with 89.4% accuracy.
...
Julkaisija
SpringerEmojulkaisun ISBN
978-3-319-58468-3Konferenssi
IFIP International Conference on ICT Systems Security and Privacy ProtectionKuuluu julkaisuun
ICT Systems Security and Privacy Protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, ProceedingsISSN Hae Julkaisufoorumista
1868-4238Asiasanat
Julkaisu tutkimustietojärjestelmässä
https://converis.jyu.fi/converis/portal/detail/Publication/27070681
Metadata
Näytä kaikki kuvailutiedotKokoelmat
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
Insecure Firmware and Wireless Technologies as “Achilles’ Heel” in Cybersecurity of Cyber-Physical Systems
Costin, Andrei (Springer, 2022)In this chapter, we analyze cybersecurity weaknesses in three use-cases of real-world cyber-physical systems: transportation (aviation), remote explosives and robotic weapons (fireworks pyrotechnics), and physical security ... -
Automatic identification of architecture and endianness using binary file contents
Kairajärvi, Sami (2019)This thesis explores how architecture and endianness of executable code can be identified using binary file contents, as falsely identifying the architecture caused about 10% of failures of firmware analysis in a recent ... -
Vulnerabilities in the wild : detecting vulnerable web applications at scale
Laitinen, Pentti (2018)Web-sovellukset ovat suosittu kohde pahansuoville hyökkäyksille. Yleisissä web-sovelluksista voi löytyä useita haavoittuvuuksia vuoden aikana, joten on tärkeää päivittää sovelluksia aktiivisesti, jos niihin tulee ... -
Attacking TrustZone on devices lacking memory protection
Stajnrod, Ron; Ben Yehuda, Raz; Zaidenberg, Nezer Jacob (Springer Science and Business Media LLC, 2022)ARM TrustZone offers a Trusted Execution Environment (TEE) embedded into the processor cores. Some vendors offer ARM modules that do not fully comply with TrustZone specifications, which may lead to vulnerabilities in the ... -
Updating strategies for distance based classification model with recursive least squares
Raita-Hakola, Anna-Maria; Pölönen, Ilkka (Copernicus Publications, 2022)The idea is to create a self-learning Minimal Learning Machine (MLM) model that is computationally efficient, easy to implement and performs with high accuracy. The study has two hypotheses. Experiment A examines the ...
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.