UFO - Hidden Backdoor Discovery and Security Verification in IoT Device Firmware

Chin Wei Tien, Tsung Ta Tsai, Ing Yi Chen, Sy Yen Kuo

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

20 Scopus citations

Abstract

Recently, the use of embedded devices such as WiFi APs, IP CAM, and drones in Internet of Things (IoT) applications has become more widespread. These embedded devices are connected to networks and are often used for critical services. Thus, they receive significant attention from hackers who attempt to find a major intrusion vector in IoT applications. Hackers focus on identifying hidden backdoors in embedded devices to gain full remote access; if they gain access, they can cause significant damage to critical infrastructures. Therefore, to improve embedded device security, this study introduces Universal Firmware vulnerability Observer (UFO); UFO is a firmware vulnerability discovery system, which can automatically perform tasks such as reversing firmware embedded filesystem, identifying vulnerability, and exploring password leaks to meet the IoT firmware security verification standards, including OWASP, UL-2900, and ICSA Labs. In addition, we design a Shell Script Dependency algorithm to help identify hidden backdoor problems by discovering suspicious shell script execution paths in the extracted firmware filesystem. We use 237 real-world embedded device firmware files to evaluate UFO. The results indicate that the effectiveness of reversing firmware binary is 96%, which is significantly higher than that of open source tools. Besides, we also conclude that 73% of firmware files contain Common Vulnerabilities and Exposures in their embedded Linux kernel, 22% of firmware files can leak login passwords, and 6% of firmware files contain hidden backdoors. Moreover, we reported hidden backdoor problems to two IoT device vendors in Taiwan and received their confirmation. UFO can be successfully used for verifying firmware security and discovering hidden backdoor threats in commercial IoT devices.

Original languageEnglish
Title of host publicationProceedings - 29th IEEE International Symposium on Software Reliability Engineering Workshops, ISSREW 2018
EditorsRoberto Natella, Sudipto Ghosh, Nuno Laranjeiro, Robin Poston, Bojan Cukic
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages18-23
Number of pages6
ISBN (Electronic)9781538694435
DOIs
StatePublished - 16 11 2018
Externally publishedYes
Event29th IEEE International Symposium on Software Reliability Engineering Workshops, ISSREW 2018 - Memphis, United States
Duration: 15 10 201818 10 2018

Publication series

NameProceedings - 29th IEEE International Symposium on Software Reliability Engineering Workshops, ISSREW 2018

Conference

Conference29th IEEE International Symposium on Software Reliability Engineering Workshops, ISSREW 2018
Country/TerritoryUnited States
CityMemphis
Period15/10/1818/10/18

Bibliographical note

Publisher Copyright:
© 2018 IEEE.

Keywords

  • Backdoor
  • Firmware Security Verification
  • IoT Security
  • Reverse Engineering
  • Vulnerability Assessment

Fingerprint

Dive into the research topics of 'UFO - Hidden Backdoor Discovery and Security Verification in IoT Device Firmware'. Together they form a unique fingerprint.

Cite this