Firmware unknown vulnerability detection method based on vulnerability analysis

A technology for unknown vulnerabilities and detection methods, which is applied in the field of firmware unknown vulnerability detection based on vulnerability analysis, and can solve problems such as incomplete confirmation of vulnerabilities, false positives of static firmware vulnerability detection methods, and failure to consider firmware program path constraints in IoT devices.

Active Publication Date: 2021-04-30
HARBIN INST OF TECH
View PDF6 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the firmware vulnerability detection method using the static analysis method, it mainly relies on the characteristics of the vulnerability to construct a vulnerability feature data set to realize the identification of the firmware vulnerability, and does not directly configure the specific environment to run the firmware program, although it has the advantages of speed and wide application , but because the path constraints between firmware pr

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Firmware unknown vulnerability detection method based on vulnerability analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0077] The present invention needs to provide input firmware sample source paths, firmware parameters, binary file base addresses, import user output functions, and firmware architecture information. In addition, it also provides a list of binary files that firmware needs to analyze, a list of network interactive binary programs, and a list of binary programs. Shared data keys for communication, global variable addresses entered by users, etc.

[0078] After accepting the above input, the system can complete the vulnerability detection of the input firmware sample. When the embedded device system has the vulnerability that can be exploited by the attacker, it will give an alarm, and the relevant information will be written. Firmware vulnerability analysis log.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a firmware unknown vulnerability detection method based on vulnerability analysis. The method comprises the following steps: step 1, collecting a target binary program of Internet of Things equipment firmware; 2, based on the target binary program of the firmware of the Internet of Things device obtained in the step 1, determining an interactive binary program in a firmware sample of the Internet of Things device; 3, based on the interactive binary program in the firmware sample of the Internet of Things equipment in the step 2, constructing a program dependence graph; 4, based on the program dependence graph in the step 3, data flow tracking of the Internet of Things equipment firmware binary program is conducted; 5, binary program unsafe interaction behavior detection is achieved based on data flow tracking and firmware vulnerability analysis in the step 4, and unknown vulnerabilities in the firmware of the Internet of Things device are determined; and 6, verifying and detecting unknown vulnerabilities in the binary program with vulnerability. The method is used for overcoming the defects of an existing networking device firmware vulnerability detection method based on static analysis.

Description

technical field [0001] The invention belongs to the field of loophole detection, and in particular relates to a method for detecting unknown loopholes of firmware based on vulnerability analysis. Background technique [0002] In the firmware vulnerability detection method using the static analysis method, it mainly relies on the characteristics of the vulnerability to construct a vulnerability feature data set to realize the identification of the firmware vulnerability, and does not directly configure the specific environment to run the firmware program, although it has the advantages of speed and wide application , but because the path constraints between firmware programs in IoT devices are not considered, such as data constraints, the purely static firmware vulnerability detection method has the problem of false positives. In addition, after the static detection method uses binary program analysis technology to obtain the location of firmware vulnerabilities, it lacks fur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 王莘姜训智黄正聪
Owner HARBIN INST OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products