Improving large-scale vulnerability analysis of IoT devices with heuristics and binary code similarity휴리스틱과 바이너리 코드 유사도에 기반한 대규모 IoT 기기 취약점 분석 방법

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 104
  • Download : 0
DC FieldValueLanguage
dc.contributor.advisorKim, Yongdae-
dc.contributor.advisor김용대-
dc.contributor.authorKim, Dongkwan-
dc.date.accessioned2023-06-23T19:33:33Z-
dc.date.available2023-06-23T19:33:33Z-
dc.date.issued2022-
dc.identifier.urihttp://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=996246&flag=dissertationen_US
dc.identifier.urihttp://hdl.handle.net/10203/309073-
dc.description학위논문(박사) - 한국과학기술원 : 전기및전자공학부, 2022.2,[vi, 106 p. :]-
dc.description.abstractTo secure numerous Internet of Things (IoT) devices globally, conducting a large-scale vulnerability analysis is essential. However, developing a scalable analysis approach that is applicable to various devices is not straightforward because 1) IoT devices have a wide variety of hardware configurations, implementations, and execution environments, and 2) their vendors often withhold information about their products. To address the scalability issue, several studies have attempted to analyze device firmware rather than physical devices. However, these approaches are currently limited to a few simple/small devices, resulting in low analysis success rates. In this thesis, we present a practical approach towards scalable vulnerability analysis of IoT devices. We began by conducting an empirical analysis of various IoT devices and discovered that many of them share a common codebase. We leveraged this similarity to develop several heuristics that enable successful firmware emulation and firmware structure analysis, which are essential for vulnerability analysis. Using these heuristics, we discovered 23 0-day vulnerabilities in wireless routers and IP cameras, as well as three 0-days in smartphone baseband devices. Following that, we present another approach that extends the vulnerability analysis by utilizing binary code similarity analysis (BCSA). There have been several BCSA approaches, but none are easily applicable because they often 1) do not share their source code or datasets and 2) employ uninterpretable machine learning techniques that make the results difficult to comprehend. To address this, we first conducted a comprehensive study of existing BCSA techniques, which revealed several insights. For instance, a simple model with a few basic features can achieve results comparable to those obtained using deep learning techniques. Based on the findings, we developed a BCSA framework and two heuristic features. We demonstrated our system’s effectiveness by analyzing over 53M functions in 1,142 IoT firmware images and successfully identifying 442 vulnerabilities. We make our source code and datasets publicly available to encourage further research.-
dc.languageeng-
dc.publisher한국과학기술원-
dc.titleImproving large-scale vulnerability analysis of IoT devices with heuristics and binary code similarity-
dc.title.alternative휴리스틱과 바이너리 코드 유사도에 기반한 대규모 IoT 기기 취약점 분석 방법-
dc.typeThesis(Ph.D)-
dc.identifier.CNRN325007-
dc.description.department한국과학기술원 :전기및전자공학부,-
dc.contributor.alternativeauthor김동관-
Appears in Collection
EE-Theses_Ph.D.(박사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0