On Manually Reverse Engineering Communication Protocols of Linux Based IoT Systems

07/23/2020
by   Kaizheng Liu, et al.
0

IoT security and privacy has raised grave concerns. Efforts have been made to design tools to identify and understand vulnerabilities of IoT systems. Most of the existing protocol security analysis techniques rely on a well understanding of the underlying communication protocols. In this paper, we systematically present the first manual reverse engineering framework for discovering communication protocols of embedded Linux based IoT systems. We have successfully applied our framework to reverse engineer a number of IoT systems. As an example, we present a detailed use of the framework reverse-engineering the WeMo smart plug communication protocol by extracting the firmware from the flash, performing static and dynamic analysis of the firmware and analyzing network traffic. The discovered protocol exposes severe design flaws that allow attackers to control or deny the service of victim plugs. Our manual reverse engineering framework is generic and can be applied to both read-only and writable Embedded Linux filesystems.

READ FULL TEXT

page 2

page 3

page 4

page 6

page 7

page 9

page 10

page 11

research
11/04/2020

An Overview of UPnP-based IoT Security: Threats, Vulnerabilities, and Prospective Solutions

Advances in the development and increased availability of smart devices ...
research
01/27/2020

Verifying Software Vulnerabilities in IoT Cryptographic Protocols

Internet of Things (IoT) is a system that consists of a large number of ...
research
07/25/2018

Specification-Based Protocol Obfuscation

This paper proposes a new obfuscation technique of a communication proto...
research
05/23/2022

A Model-Driven-Engineering Approach for Detecting Privilege Escalation in IoT Systems

Software vulnerabilities in access control models can represent a seriou...
research
02/06/2020

MAC Protocol Design Optimization Using Deep Learning

Deep learning (DL)-based solutions have recently been developed for comm...
research
05/22/2023

Extracting Protocol Format as State Machine via Controlled Static Loop Analysis

Reverse engineering of protocol message formats is critical for many sec...
research
01/12/2021

Declarative Demand-Driven Reverse Engineering

Binary reverse engineering is a challenging task because it often necess...

Please sign up or login with your details

Forgot password? Click here to reset