Towards Automated Dynamic Analysis for Linux-based Embedded Firmware
Dominic Chen1, Manuel Egele2, Maverick Woo1, David Brumley1
1Carnegie Mellon University, 2Boston University
{ddchen, pooh, dbrumley}@cmu.edu, megele@bu.edu
Towards Automated Dynamic Analysis for Linux-based Embedded Firmware - - PowerPoint PPT Presentation
Towards Automated Dynamic Analysis for Linux-based Embedded Firmware Dominic Chen 1 , Manuel Egele 2 , Maverick Woo 1 , David Brumley 1 1 Carnegie Mellon University, 2 Boston University {ddchen, pooh, dbrumley}@cmu.edu, megele@bu.edu 2 FIRMADYNE
1Carnegie Mellon University, 2Boston University
{ddchen, pooh, dbrumley}@cmu.edu, megele@bu.edu
2
3
4
5
500 1000 1500 2000 2500 3000 3500 4000 4500 5000
MIPS ARM Unknown x86-64 PPC MIPS-64 x86 Other
Number of Firmware Images
Big Endian Little Endian Unknown
6
7
FTP Sites Support Websites Filesystem Kernel Architecture Identification Initial Emulation MIPS Little-Endian Network Identification Exploit Verification “&& cat 0xDEADBEEF”
8 Network Reachable eth0: 192.168.1.100 eth1: 10.0.0.1 eth2: 128.2.42.52
9
10
11
12
13
1000 2000 3000 4000 5000 6000
Downloaded Extracted Architecture Identified Initial Emulation Network Inferred Network Reachable Exploited Number of Firmware Images Other QNAP Polycom TRENDnet TP-Link OpenWrt ZyXEL Synology Tomato by Shibby D-Link Netgear
14
* Corrected
15
16
17
18
– Unauthenticated remote attackers can dump configuration – Affects 282 firmware images across 16+ products from our dataset – Our results show On Networks and TRENDnet are also affected
– Parsing flaws in open-source internet-facing UPnP daemon – Affects 169 firmware images across 14+ products from our dataset
– TLS implementation allows attacker to downgrade cipher – Affects 169 firmware images across 27+ products from our dataset
19
20
5% 4% 16% 33% 1% 7% 1% 33% Authentication Bypass Backdoor Buffer Overflow Command Execution Cryptographic Flaw Denial of Service File Upload Information Disclosure
21
22