信息网络安全 ›› 2022, Vol. 22 ›› Issue (8): 44-54.doi: 10.3969/j.issn.1671-1122.2022.08.006

• 技术研究 • 上一篇    下一篇

基于前后端关联性分析的固件漏洞静态定位方法

刘翎翔1,2, 潘祖烈1,2(), 李阳1,2, 李宗超1,2   

  1. 1.国防科技大学电子对抗学院,合肥 230037
    2.网络空间安全态势感知与评估安徽省重点实验室,合肥 230037
  • 收稿日期:2022-05-29 出版日期:2022-08-10 发布日期:2022-09-15
  • 通讯作者: 潘祖烈 E-mail:panzulie17@nudt.edu.cn
  • 作者简介:刘翎翔(1998—),男,湖南,硕士研究生,主要研究方向为网络空间安全|潘祖烈(1976—),男,安徽,教授,博士,主要研究方向为网络空间安全。|李阳(1990—),男,河北,讲师,硕士,主要研究方向为网络空间安全|李宗超(2000—),男,云南,主要研究方向为网络空间安全
  • 基金资助:
    国家重点研发计划(2021YFB3100500)

Firmware Vulnerability Static Localization Method Based on Front-End and Back-End Correlation Analysis

LIU Lingxiang1,2, PAN Zulie1,2(), LI Yang1,2, LI Zongchao1,2   

  1. 1. College of Electronic Engineering, National University of Defense Technology, Hefei 230037, China
    2. Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, Hefei 230037, China
  • Received:2022-05-29 Online:2022-08-10 Published:2022-09-15
  • Contact: PAN Zulie E-mail:panzulie17@nudt.edu.cn

摘要:

目前大多数物联网设备通过Web服务接口进行远程管理,利用Web服务漏洞发起攻击成为当前物联网设备安全面临的主要威胁之一。文章提出一种针对物联网设备Web服务漏洞的静态挖掘方法,首先基于前端脚本文件与边界二进制程序之间的关联性特征,通过对前后端文件进行关联分析,识别固件中的边界二进制程序,确定在边界二进制程序中针对Web输入数据的起始处理位置。然后利用污点分析技术判断输入数据是否会被漏洞触发函数处理,定位程序中的危险函数区域。最后实现固件漏洞静态方法的原型系统FBIR,并对10款固件进行实验,通过定位危险函数的方式验证45个已知漏洞并挖掘出12个零日漏洞。在漏报率只有14.9%的基础上,与传统人工分析的方法对比,文章所提方法将程序函数分析范围平均缩小了86%。

关键词: 固件漏洞分析, 关联性分析, 边界二进制程序

Abstract:

At present, most IoT devices are remotely managed through Web service interfaces, exploiting Web service vulnerabilities to launch attacks is an important threat facing current IoT devices. This paper proposed a static mining method for Web service vulnerabilities in IoT devices. Firstly, based on the presence of certain correlation characteristics between the front-end script file and the boundary binary program (a binary program specifically designed to process Web service data), the boundary binary program in the firmware was identified by the association analysis of the front-end and back-end files, the Web input data corresponded to the processing position of the boundary binary program. Then the taint analysis technique was used to determine whether the input data will be processed by the vulnerability trigger function. Locate the area of the hazard function that existed in the program. Finally, the prototype system FBIR of the method was realized, and 10 firmwares were tested, 45 known vulnerabilities were verified by locating dangerous functions, and 12 zero-day vulnerabilities were excavated. On the basis of the false negative rate of only 14.9%, the analysis range of program was reduced by 86%.

Key words: firmware vulnerability analysis, correlation analysis, border binary program

中图分类号: