A search-based firmware code analysis method for IoT devices

  • Yifei Xu
  • , Ting Liu
  • , Pengfei Liu
  • , Hong Sun

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Scopus citations

Abstract

The firmware vulnerability is one of the most serious threats for Internet-of-Things (IoT) security. However, it is hard to investigate firmware, due to the lack of source code and the complicated structure. In this paper, a searchbased firmware code analysis method is proposed to associate the program functionalities with the assembly code. In the experiment, the firmware of Siemens PAC4200 power meter is selected to demonstrate how to search the assembly code of device information interface. Moreover, one vulnerability of this interface is shown, which would be exploited to manipulate the data of device.

Original languageEnglish
Title of host publication2018 IEEE Conference on Communications and Network Security, CNS 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Print)9781538645864
DOIs
StatePublished - 10 Aug 2018
Event6th IEEE Conference on Communications and Network Security, CNS 2018 - Beijing, China
Duration: 30 May 20181 Jun 2018

Publication series

Name2018 IEEE Conference on Communications and Network Security, CNS 2018

Conference

Conference6th IEEE Conference on Communications and Network Security, CNS 2018
Country/TerritoryChina
CityBeijing
Period30/05/181/06/18

Keywords

  • Firmware Code Analysis
  • Internet-of-Things
  • Security

Fingerprint

Dive into the research topics of 'A search-based firmware code analysis method for IoT devices'. Together they form a unique fingerprint.

Cite this