Netinfo Security ›› 2026, Vol. 26 ›› Issue (2): 325-337.doi: 10.3969/j.issn.1671-1122.2026.02.012

Previous Articles     Next Articles

High-Confidence Vulnerability Detection in IoT Firmware Based on Taint Flow Analysis

ZHANG Guanghua1, LI Guoyu1, WANG He2, LI Heng3, WU Shaoguang1()   

  1. 1. School of Information Science and Engineering, Hebei University of Science and Technology, Shijiazhuang 050018, China
    2. School of Cyber Engineering, Xidian University, Xi’an 710071, China
    3. Hebei Cybersecurity Perception and Defense Technology Innovation Center, Shijiazhuang 052161, China
  • Received:2025-06-20 Online:2026-02-10 Published:2026-02-23

Abstract:

The proliferation of Internet of Things (IoT) devices has led to increasingly severe security challenges posed by embedded firmware vulnerabilities. Current mainstream taint analysis schemes are plagued by significant limitations, including path explosion and high false positive rates. To overcome the limitations of existing solutions, this paper proposed Laptaint, a high-accuracy firmware vulnerability detection scheme based on taint analysis. First, for keyword matching, Laptaint integrated lightweight model and fuzzy matching to enhance keyword identification. This approach precisely recognized input sources, thereby reducing false negatives caused by missing source points. Second, in terms of data flow analysis, a fine-grained taint semantics model was constructed. This model utilized definitional reachability analysis to iteratively trace backward from hazardous function call sites, reaching the taint sources. Finally, for function sanitization, an integrated sanitization verification module validated tainted inputs through four distinct checking logics. Experiments conduct on 30 real-world device firmwares demonstrat Laptaint’s ability to identify vulnerabilities with an 82.02% accuracy rate, outperforming comparable schemes.

Key words: firmware security, vulnerability detection, taint analysis, sanitization validation

CLC Number: