A Component Vulnerability Matching Approach for IoT Firmware.

Bo Yu ,Yongyi Zhang,Runhao Liu,Zhoushi Sheng
DOI: https://doi.org/10.1145/3542637.3543705
2022-01-01
Abstract:Component vulnerability matching offers an approach for discovering vulnerabilities existing in IoT firmware. In this work, A component composition analysis and reliability assessment (C2ARA) is developed to improve the component vulnerability matching. The C2ARA method employs a knowledge graph for discovering the components and their relationships from the extracted file system of the firmware. The key to the proposed method is to discover vulnerabilities from the component composition extracted from IoT firmware file systems, rather than only the information provided by CVE databases and firmware vendor. The results of the experiment with a large-scale dataset demonstrate the effectiveness of the C2ARA method.
What problem does this paper attempt to address?