AVATAR: A framework to support dynamic security analysis of embedded systems' firmwares

作者: Jonas Zaddach , Luca Bruno , Aurélien Francillon , Davide Balzarotti

DOI: 10.14722/NDSS.2014.23229

关键词:

摘要: In this paper we present Avatar, a framework that enables complex dynamic analysis of embedded devices by orchestrating the execution an emulator together with real hardware. We first introduce basic mechanism to forward I/O accesses from device, and then describe several techniques improve system’s performance dynamically optimizing distribution code data between two environments. Finally, evaluate our tool applying it three different security scenarios, including reverse engineering, vulnerability discovery hardcoded backdoor detection. To show flexibility perform on completely devices: GSM feature phone, hard disk bootloader, wireless sensor node. I. INTRODUCTION

参考文章(44)
David A. Molnar, Michael Y. Levin, Patrice Godefroid, Automated Whitebox Fuzz Testing. network and distributed system security symposium. ,(2008)
Anthony Cozzie, Hui Xue, Frank Stratton, Samuel T. King, Digging for data structures operating systems design and implementation. pp. 255- 266 ,(2008) , 10.5555/1855741.1855759
Peter H. Schmitt, Benjamin Weiß, Inferring Invariants by Symbolic Execution. VERIFY. ,(2007)
David Brumley, Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao, AEG: Automatic Exploit Generation network and distributed system security symposium. ,(2011) , 10.1184/R1/6468296.V1
Matthias Neugschwandtner, Asia Slowinska, Istvan Haller, Herbert Bos, Dowsing for overflows: a guided fuzzer to find buffer boundary violations usenix security symposium. pp. 49- 64 ,(2013)
C. Melear, Emulation techniques for microcontrollers WESCON/97 Conference Proceedings. pp. 532- 541 ,(1997) , 10.1109/WESCON.1997.632381
Fabrice Bellard, QEMU, a fast and portable dynamic translator usenix annual technical conference. pp. 41- 41 ,(2005)
Ang Cui, Salvatore J. Stolfo, Defending Embedded Systems with Software Symbiotes Lecture Notes in Computer Science. pp. 358- 377 ,(2011) , 10.1007/978-3-642-23644-0_19
Michael Williams, ARMV8 debug and trace architectures Proceedings of the 2012 System, Software, SoC and Silicon Debug Conference. pp. 1- 6 ,(2012)
Thomas Ristenpart, Somesh Jha, Drew Davidson, Benjamin Moench, FIE on firmware: finding vulnerabilities in embedded systems using symbolic execution usenix security symposium. pp. 463- 478 ,(2013)