通信学报

• 技术报告 • 上一篇    下一篇

无文件系统嵌入式固件后门检测

忽朝俭1,2,薛一波1,赵粮2,李舟军3   

  1. 1. 清华大学 信息技术研究院,北京 100084;2. 绿盟科技,北京 100089;3. 北京航空航天大学 计算机学院,北京 100191
  • 出版日期:2013-08-25 发布日期:2013-08-15
  • 基金资助:
    国家自然科学基金资助项目(61170189, 60973105, 90718017);国家科技重大专项基金资助项目(2012ZX03002002-003)

Backdoor detection in embedded system firmware without file system

  • Online:2013-08-25 Published:2013-08-15

摘要: 在无文件系统嵌入式固件中,系统代码和应用代码集成在单个文件中,无法看到熟悉的系统调用名字,故针对此类固件的分析将更为困难。以此类固件为研究对象,分析了其中的库函数识别问题,并提出了一种针对网络套接字和字符串/内存操作函数的基于启发式规则的识别方法。在此基础上,讨论了多种典型的后门类型检测问题,包括未授权侦听者、非预期功能、隐藏功能和向外的连接请求等,并在一款实际系统上成功检测出多个后门(其中有一个严重级别的)。实验结果表明,提出的针对无文件系统嵌入式固件的库函数识别方法对于此类固件的安全分析具有重要的参考价值。

Abstract: Any embedded system firmware without file system will integrate its system code and user application code into a single file. This setting has brought some additional difficulties to analyze them. Aimed at this kind of firmware, the problem of library function identification was analyzed, and several heuristic methods to recognize some important function relevant with manipulating network socket and character string / memory were proposed. Based on this analysis, the backdoor detection problem of some typical types including unauthorized listener, unintended function, hidden function, outward connection request etc. were discussed, and several backdoors (one is critical level) in a real world firmware were found. The result shows this method of identifying library function can be useful for security analysis to this type of firmware.

No Suggested Reading articles found!