Systematically Detecting Packet Validation Vulnerabilities in Embedded Network Stacks

08/21/2023
by   Paschal C. Amusuo, et al.
0

Embedded Network Stacks (ENS) enable low-resource devices to communicate with the outside world, facilitating the development of the Internet of Things and Cyber-Physical Systems. Some defects in ENS are thus high-severity cybersecurity vulnerabilities: they are remotely triggerable and can impact the physical world. While prior research has shed light on the characteristics of defects in many classes of software systems, no study has described the properties of ENS defects nor identified a systematic technique to expose them. The most common automated approach to detecting ENS defects is feedback-driven randomized dynamic analysis ("fuzzing"), a costly and unpredictable technique. This paper provides the first systematic characterization of cybersecurity vulnerabilities in ENS. We analyzed 61 vulnerabilities across 6 open-source ENS. Most of these ENS defects are concentrated in the transport and network layers of the network stack, require reaching different states in the network protocol, and can be triggered by only 1-2 modifications to a single packet. We therefore propose a novel systematic testing framework that focuses on the transport and network layers, uses seeds that cover a network protocol's states, and systematically modifies packet fields. We evaluated this framework on 4 ENS and replicated 12 of the 14 reported IP/TCP/UDP vulnerabilities. On recent versions of these ENSs, it discovered 7 novel defects (6 assigned CVES) during a bounded systematic test that covered all protocol states and made up to 3 modifications per packet. We found defects in 3 of the 4 ENS we tested that had not been found by prior fuzzing research. Our results suggest that fuzzing should be deferred until after systematic testing is employed.

READ FULL TEXT

page 1

page 3

research
05/03/2023

Towards a Real-Time IoT: Approaches for Incoming Packet Processing in Cyber-Physical Systems

Embedded real-time devices for monitoring, controlling, and collaboratio...
research
07/24/2018

Automatically Assessing Vulnerabilities Discovered by Compositional Analysis

Testing is the most widely employed method to find vulnerabilities in re...
research
05/02/2021

A Systematic Review of Security in the LoRaWAN Network Protocol

The age of the Internet of Things is adding an increasing number of new ...
research
09/19/2019

SCDP: Systematic Rateless Coding for Efficient Data Transport in Data Centres

In this paper we propose SCDP, a novel, general-purpose data transport p...
research
07/20/2023

Formal-Guided Fuzz Testing: Targeting Security Assurance from Specification to Implementation for 5G and Beyond

Softwarization and virtualization in 5G and beyond necessitate thorough ...
research
10/07/2021

MPD: Moving Target Defense through Communication Protocol Dialects

Communication protocol security is among the most significant challenges...
research
07/05/2021

Berserker: ASN.1-based Fuzzing of Radio Resource Control Protocol for 4G and 5G

Telecom networks together with mobile phones must be rigorously tested f...

Please sign up or login with your details

Forgot password? Click here to reset