On Manually Reverse Engineering Communication Protocols of Linux-Based IoT Systems

Kaizheng Liu,Ming Yang,Zhen Ling,Huaiyu Yan,Yue Zhang,Xinwen Fu,Wei Zhao
DOI: https://doi.org/10.1109/jiot.2020.3036232
IF: 10.6
2021-04-15
IEEE Internet of Things Journal
Abstract:IoT security and privacy has raised grave concerns. Efforts have been made to design tools to identify and understand vulnerabilities of IoT systems. Most of the existing protocol security analysis techniques rely on a well understanding of the underlying communication protocols. In this article, we systematically present the first manual reverse engineering framework for discovering communication protocols of embedded Linux-based IoT systems. We have successfully applied our framework to reverse engineer a number of IoT systems. As an example, we present a detailed use of the framework reverse engineering the WeMo smart plug communication protocol by extracting the firmware from the flash, performing static and dynamic analysis of the firmware, and analyzing network traffic. The discovered protocol exposes severe design flaws that allow attackers to control or deny the service of victim plugs. Our manual reverse engineering framework is generic and can be applied to both read-only and writable embedded Linux filesystems.
computer science, information systems,telecommunications,engineering, electrical & electronic
What problem does this paper attempt to address?