作者: Sam L. Thomas , Tom Chothia , Flavio D. Garcia
DOI: 10.1007/978-3-319-66399-9_28
关键词:
摘要: Finding undocumented functionality in commercial off-the-shelf (COTS) device firmware is an important and challenging task. This paper proposes a new static analysis method that measures the influence individual pieces of data (such as strings) have upon control flow binaries firmware. Our automatically identifies comparison functions within binaries, then labels each function’s basic blocks with set sequences must be matched against to reach them. Then using these sets, it assigns score function, which extent branching influenced by data. Special keywords triggering backdoor will large impact on program flow. allows us identify three authentication backdoors – two previously undocumented. Moreover, we show our effective aiding recovery both known proprietary text-based protocols. We developed tool, Stringer implements technique; demonstrate effectiveness approach well its applicability lightweight running 2,451,532 from 30 different COTS vendors.