A Large Scale Analysis of the Security
- f Embedded Firmwares
- A. Costin, J. Zaddach, A. Francillon, D. Balzarotti
A Large Scale Analysis of the Security of Embedded Firmwares A. - - PowerPoint PPT Presentation
A Large Scale Analysis of the Security of Embedded Firmwares A. Costin , J. Zaddach, A. Francillon, D. Balzarotti EURECOM, France 20th August 2014 USENIX Security '14 San Diego, USA Embedded Systems Are Everywhere Andrei Costin 2 By
Andrei Costin 2
By Wilgengebroed on Flickr [CC-BY-2.0]
Andrei Costin 3
By Wilgengebroed on Flickr [CC-BY-2.0]
Andrei Costin 4
By Wilgengebroed on Flickr [CC-BY-2.0]
Andrei Costin 5
Andrei Costin 6
Andrei Costin 7
Andrei Costin 8
Andrei Costin 9
Andrei Costin 10
Andrei Costin 11
Andrei Costin 12
Andrei Costin 13
Andrei Costin 14
Andrei Costin 15
Andrei Costin 16
– Can only test for known vulnerabilities – Blackbox approach
Andrei Costin 17
Andrei Costin 18
Andrei Costin 19
Andrei Costin 20
Andrei Costin 21
Andrei Costin 22
Andrei Costin 23
Andrei Costin 24
Andrei Costin 25
Andrei Costin 26
Andrei Costin 27
Andrei Costin 28
Andrei Costin 29
Andrei Costin 30
Andrei Costin 31
Andrei Costin 32
Andrei Costin 33
– .EXE→self-extracting archive
Andrei Costin 34
– .EXE→self-extracting archive
– .PS→ASCII85 stream→ELF file that could be:
Andrei Costin 35
– .EXE→self-extracting archive
– .PS→ASCII85 stream→ELF file that could be:
Andrei Costin 36
Andrei Costin 37
Andrei Costin 38
Andrei Costin 39
Andrei Costin 40
Andrei Costin 41
Andrei Costin 42
Andrei Costin 43
Internet Crawl Firmware Datastore
Andrei Costin 44
Internet Public Web Interface Crawl Submit Firmware Datastore
Andrei Costin 45
Internet Public Web Interface Crawl Submit Firmware Datastore Firmware Analysis Cloud
Andrei Costin 46
Internet Public Web Interface Crawl Submit Firmware Datastore Master Firmware Analysis Cloud
Andrei Costin 47
Internet Public Web Interface Crawl Submit Firmware Datastore Master Workers Distribute Unpacking Static Analysis Fuzzy Hashing Firmware Analysis Cloud Password Hash Cracker
Andrei Costin 48
Internet Public Web Interface Crawl Submit Firmware Datastore Master Workers Distribute Unpacking Static Analysis Fuzzy Hashing Firmware Analysis & Reports DB Firmware Analysis Cloud Password Hash Cracker
Andrei Costin 49
Internet Public Web Interface Crawl Submit Firmware Datastore Master Workers Distribute Unpacking Static Analysis Fuzzy Hashing Firmware Analysis & Reports DB Firmware Analysis Cloud Password Hash Cracker Data Enrichment Correlation Engine
Andrei Costin 50
Andrei Costin 51
Andrei Costin 52
Andrei Costin 53
Andrei Costin 54
Filter non firmware Random selection Successful unpack Unpacked files
Andrei Costin 55
Andrei Costin 56
Firmware 1
Andrei Costin 57
Firmware 1
Andrei Costin 58
Firmware 1 Firmware 2 Firmware 3
95% 99% 0%
Firmware 4 Firmware 5
Andrei Costin 59
Firmware 1 Firmware 2 Firmware 3
95% 99% 0%
Firmware 4 Firmware 5
Andrei Costin 60
Firmware 1 Firmware 2 Firmware 3
95% 99% 0%
Firmware 4 Firmware 5
Andrei Costin 61
Private RSA keys
Andrei Costin 62
Analysis & Reports Database Private RSA keys
Andrei Costin 63
Analysis & Reports Database Private RSA keys VendorA Device1
Andrei Costin 64
Analysis & Reports Database Private RSA keys VendorA HTTPS Ecosystem Scans 1 key → ~30.000 IPs Device1 Check ZMap IP addresses
Andrei Costin 65
Analysis & Reports Database Private RSA keys VendorA HTTPS Ecosystem Scans 1 key → ~30.000 IPs VendorB SAME private RSA SAME self-signed SSL certificate DIFFERENT vendor Device1 Device2 Check ZMap IP addresses
Andrei Costin 66
Analysis & Reports Database Private RSA keys VendorA HTTPS Ecosystem Scans 1 key → ~30.000 IPs VendorB SAME private RSA SAME self-signed SSL certificate DIFFERENT vendor Device1 Device2 Check ZMap IP addresses Common Vulnerable Components
Andrei Costin 67
Andrei Costin 68
Andrei Costin 69
Andrei Costin 70
Andrei Costin 71
Andrei Costin 72
rd USENIX