FirmVEA: Vulnerability Discovery Optimisation for IoT Firmware via Version Evolution Analysis

Bo Yu,Ying Zhang,Yongyi Zhang,Qiang Yang
DOI: https://doi.org/10.1109/GLOBECOM54140.2023.10437669
2023-01-01
Abstract:With the development and widespread application of IoT technology, the impact of N-day vulnerabilities on IoT firmware has become increasingly serious. Detection technology for IoT firmware vulnerabilities plays an increasingly important role in IoT security. However, existing approaches for firmware vulnerability detection did not consider the issue of vulnerabilities between components, which are introduced in a supply chain's business process, such as library reuse and collaboration development. Meanwhile, they did not consider the component changes across the evolution of firmware versions, which is not conducive to analysts timely patching and managing vulnerable components, resulting in the duplication of analysis of components and inefficient analysis. Thus, feasible methods for analysing version evolution and discovering component vulnerabilities are urgently needed. In this paper, we design and implement FirmVEA, which discovers IOT component vulnerabilities via version evolution analysis. To evaluate our approach, we collect 10161 real-world firmware with 1053 firmware components (shortened as FC) from 11 different vendors, which cover various architectures such as MIPS, ARM, X86, PowerPC, and various OSs such as Linux, and FreeBSD (32/64-bit). The experiments show that FirmVEA can analyze the relationship between complex components, expose components and vulnerabilities change in adjacent firmware versions, and is on average 10 times more efficient than the state-of-the-art tool FACT while ensuring no loss of accuracy, making it suitable for large-scale IoT firmware N-day vulnerability analysis.
What problem does this paper attempt to address?