Näytä suppeat kuvailutiedot

dc.contributor.authorCarrillo-Mondejar, J.
dc.contributor.authorTurtiainen, Hannu
dc.contributor.authorCostin, Andrei
dc.contributor.authorMartinez, J.L.
dc.contributor.authorSuarez-Tangil, G.
dc.date.accessioned2022-11-29T10:25:40Z
dc.date.available2022-11-29T10:25:40Z
dc.date.issued2022
dc.identifier.citationCarrillo-Mondejar, J., Turtiainen, H., Costin, A., Martinez, J.L., & Suarez-Tangil, G. (2022). HALE-IoT : HArdening LEgacy Internet-of-Things devices by retrofitting defensive firmware modifications and implants. <i>IEEE Internet of Things Journal</i>, <i>10</i>(10), 8371-8394. <a href="https://doi.org/10.1109/JIOT.2022.3224649" target="_blank">https://doi.org/10.1109/JIOT.2022.3224649</a>
dc.identifier.otherCONVID_160412620
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/84130
dc.description.abstractInternet-Of-Things (IoT) devices and their firmware are notorious for their lifelong vulnerabilities. As device infection increases, vendors also fail to release patches at a competitive pace. Despite security in IoT being an active area of research, prior work has mainly focused on vulnerability detection and exploitation, threat modelling, and protocol security. However, these methods are ineffective in preventing attacks against legacy and End-Of-Life devices that are already vulnerable. Current research mainly focuses on implementing and demonstrating the potential of malicious modifications. Hardening emerges as an effective solution to provide IoT devices with an additional layer of defense. In this paper, we bridge these gaps through the design of HALE-IoT, a generically applicable systematic approach to HArdening LEgacy IoT non-low-end devices by retrofitting defensive firmware modifications without access to the original source code. HALE-IoT approaches this non-trivial task via binary firmware reversing and modification while being underpinned by a semi-automated toolset that aims to keep cybersecurity of such devices in a hale state. Our focus is on both modern and, especially, legacy or obsolete IoT devices as they become increasingly prevalent. To evaluate the effectiveness and efficiency of HALE-IoT, we apply it to a wide range of IoT devices by retrofitting 395 firmware images with defensive implants containing an intrusion prevention system in the form of a Web Application Firewall (for prevention of web-attack vectors), and an HTTPS-proxy (for latest and full end-to-end HTTPS support) using emulation. We also test our approach on four physical devices, where we show that HALE-IoT successfully runs on protected and quite constrained devices with as low as 32MB of RAM and 8MB of storage. Overall, in our evaluation, we achieve good performance and reliability with a remarkably accurate detection and prevention rate for attacks coming from both real CVEs and synthetic exploits.en
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherIEEE
dc.relation.ispartofseriesIEEE Internet of Things Journal
dc.rightsCC BY 4.0
dc.subject.othercybersecurity
dc.subject.otherIoT
dc.subject.otherdevices
dc.subject.otherlegacy
dc.subject.otherend-of-life
dc.subject.otherEOL
dc.subject.otherfirmware
dc.subject.otherfirmware modification
dc.subject.otherretrofit security
dc.subject.otherdefensive techniques
dc.subject.otherWAF
dc.subject.otherHTTPS
dc.subject.otherSSL-proxy
dc.titleHALE-IoT : HArdening LEgacy Internet-of-Things devices by retrofitting defensive firmware modifications and implants
dc.typearticle
dc.identifier.urnURN:NBN:fi:jyu-202211295405
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineTekniikkafi
dc.contributor.oppiaineSecure Communications Engineering and Signal Processingfi
dc.contributor.oppiaineEngineeringen
dc.contributor.oppiaineSecure Communications Engineering and Signal Processingen
dc.type.urihttp://purl.org/eprint/type/JournalArticle
dc.type.coarhttp://purl.org/coar/resource_type/c_2df8fbb1
dc.description.reviewstatuspeerReviewed
dc.format.pagerange8371-8394
dc.relation.issn2372-2541
dc.relation.numberinseries10
dc.relation.volume10
dc.type.versionacceptedVersion
dc.rights.copyright© Authors, 2022
dc.rights.accesslevelopenAccessfi
dc.subject.ysokyberturvallisuus
dc.subject.ysotietoturva
dc.subject.ysoesineiden internet
dc.subject.ysoverkkohyökkäykset
dc.subject.ysohaavoittuvuus
dc.subject.ysosuojaus
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
jyx.subject.urihttp://www.yso.fi/onto/yso/p5479
jyx.subject.urihttp://www.yso.fi/onto/yso/p27206
jyx.subject.urihttp://www.yso.fi/onto/yso/p27466
jyx.subject.urihttp://www.yso.fi/onto/yso/p25011
jyx.subject.urihttp://www.yso.fi/onto/yso/p3601
dc.rights.urlhttps://creativecommons.org/licenses/by/4.0/
dc.relation.doi10.1109/JIOT.2022.3224649
jyx.fundinginformationJavier Carrillo-Mondejar is also supported by the Spanish Ministry of Economic Affairs and Digital Transformation under the project RTI2018-098156-B-C52, by the Spanish Ministry of Science and Innovation under the project PID2021-123627OBC52, by the Regional Gobernment of Castilla-La Mancha under the projects SBPLY/17/180501/000353 and SBPLY/21/180501/000195, and by the Spanish Education, Culture and Sports Ministry under grant FPU 17/03105. Parts of this research are supported by “Decision of the Research Dean on research funding (20.04.2022)” and “Dean’s decision on researcher mobility grants (17.1.2022)” within the Faculty of Information Technology of University of Jyväskylä. Hannu Turtiainen also thanks the Finnish Cultural Foundation / Suomen Kulttuurirahasto (https://skr.fi/en) for supporting his Ph.D. dissertation work and research (under grant decision no. 00221059) and the Faculty of Information Technology of the University of Jyväskylä (JYU), in particular, Prof. Timo Hämäläinen, for partly supporting and supervising his Ph.D. work at JYU in 2021–2023. Guillermo Suarez-Tangil was funded by the “Ramon y Cajal” Fellowship RYC-2020-029401-I, and supported by TED2021-132900A-I00 from the Spanish Ministery of Science and Innovation.
dc.type.okmA1


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

CC BY 4.0
Ellei muuten mainita, aineiston lisenssi on CC BY 4.0