avatar2
Marius Muench 34c3 - December 29, 2017
Contents 1. Binary firmware analysis 2. Tooling landscape 3. The - - PowerPoint PPT Presentation
avatar 2 Marius Muench 34c3 - December 29, 2017 Contents 1. Binary firmware analysis 2. Tooling landscape 3. The avatar 2 framework 4. Examples 5. Conclusion 1 Binary Firmware Analysis Motivation Amount of embedded devices steadily
Marius Muench 34c3 - December 29, 2017
1
2
3
https://en.wikipedia.org/wiki/List of ARM microarchitectures#Designed by ARM 3
4
5
Davidson, Drew, et al. ”FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution.” USENIX Security Symposium 2013. 6
Davidson, Drew, et al. ”FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution.” USENIX Security Symposium 2013. 6
Chen, Daming D., et al. ”Towards Automated Dynamic Analysis for Linux-based Embedded Firmware.” NDSS 2016. 7
Chen, Daming D., et al. ”Towards Automated Dynamic Analysis for Linux-based Embedded Firmware.” NDSS 2016. 7
https://github.com/Comsecuris/luaqemu 8
https://github.com/Comsecuris/luaqemu 8
Zaddach, Jonas, et al. ”AVATAR: A Framework to Support Dynamic Security Analysis
9
Zaddach, Jonas, et al. ”AVATAR: A Framework to Support Dynamic Security Analysis
9
10
11
elien Francillon
http://s3.eurecom.fr/ 12
13
14
Avatar2 T arget0 Execution Protocol Memory Protocol Endpoint0 Register Protocol T argetn Execution Protocol Memory Protocol Endpointn Register Protocol
. . . . . . . . .
15
16
16
16
16
1Still under development
16
17
18
19
20
2Garcia, Luis, et al. ”Hey, My Malware Knows Physics Attacking PLCs with
Physical Model Aware Rootkit.” NDSS 2016.
21
22
23
3Muench, Marius, et.al. ”What you corrupt is not what you crash: Challenges
in Fuzzing Embedded Devices” To be presented at NDSS 2018
24
25
26
27
28
29
30
31
32
33
34
35
35