Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Automatic mining method and system for misuse vulnerabilities of third-party components of firmware of Internet of Things based on Datalog

An Internet of Things and component technology, applied in the field of Internet of Things security, can solve problems such as restricting large-scale applications, complex usage rules, and unauthorized attacks, and achieve the effect of improving detection success rate and efficiency, and high-precision mining.

Pending Publication Date: 2022-07-08
尚蝉(浙江)科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Third-party components often have cumbersome and complex usage rules. Calling third-party components that do not strictly follow such usage rules may cause various vulnerabilities, such as memory leaks, unauthorized attacks, etc.
After the firmware is disassembled, it is impossible to obtain source code-level semantic information and code context logic relationships, so it is difficult to match third-party component usage rules
The current mainstream IoT firmware vulnerability mining methods all have defects that limit large-scale applications, such as high false positive rate, manual participation and low success rate, etc.
(3) Difficult to identify third-party components
[0005] Vulnerabilities in IoT firmware due to misuse of third-party components can have serious consequences, and there is currently no effective way to detect such vulnerabilities at the binary level

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Automatic mining method and system for misuse vulnerabilities of third-party components of firmware of Internet of Things based on Datalog
  • Automatic mining method and system for misuse vulnerabilities of third-party components of firmware of Internet of Things based on Datalog
  • Automatic mining method and system for misuse vulnerabilities of third-party components of firmware of Internet of Things based on Datalog

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention will be further described in detail below with reference to the accompanying drawings and embodiments. It should be noted that the following embodiments are intended to facilitate the understanding of the present invention, but do not have any limiting effect on it.

[0030] like figure 1 As shown, the datalog-based IoT firmware third-party component misuse vulnerability automatic mining system of the present invention includes: a firmware preprocessing module, a Datalog encoding module, a third-party component identification and rule extraction module, and a vulnerability query module.

[0031] The workflow of the entire IoT firmware third-party component misuse vulnerability automated mining system is as follows figure 2 shown, including the following steps:

[0032] Step 1: Firmware preprocessing: Collect different types of IoT device firmware from different manufacturers, and preprocess the firmware to be tested. Use binwalk and file magic nu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a Datalog-based automatic vulnerability mining method and system for a third-party component of firmware of the Internet of Things, and belongs to the technical field of security of the Internet of Things. The system comprises a firmware preprocessing module for collecting firmware, preprocessing the firmware and storing the firmware into a firmware warehouse; the Datalog coding module is used for extracting files in the firmware and extracting character string contents, and recoding a decompilation result of the binary file by adopting a Datalog coding method; the third-party component identification and rule extraction module is used for identifying a third-party component in the firmware based on regular matching and editing distance and acquiring a related third-party component use rule; and the vulnerability query module is used for performing logical query on the misuse vulnerability of the third-party component in the firmware by utilizing a Datalog query template filled based on the use rule of the third-party component. According to the method, the misuse vulnerability of the third-party component in the firmware of the Internet of Things can be quickly mined with high precision.

Description

technical field [0001] The invention relates to the technical field of Internet of Things security, in particular to a method and system for automatic mining of misuse vulnerabilities of third-party components of Internet of Things firmware based on Datalog. Background technique [0002] With the continuous development of the Internet of Things, all kinds of Internet of Things devices have entered thousands of households. IoT devices are affecting every aspect of our lives. However, the security issues posed by IoT devices cannot be ignored. While pursuing development speed, developers often ignore the security of IoT devices, resulting in frequent IoT device vulnerabilities. At present, all kinds of botnets take IoT devices as their primary targets, and IoT devices have become an important basis for botnets to launch attacks. [0003] Since the development of IoT devices has long relied on various third-party components, vulnerabilities caused by third-party components a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F8/53
CPCG06F21/577G06F8/53
Inventor 纪守领赵彬彬王琴应张旭鸿祝羽艳杨星
Owner 尚蝉(浙江)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products