Chinese Journal of Network and Information Security ›› 2023, Vol. 9 ›› Issue (1): 150-157.doi: 10.11959/j.issn.2096-109x.2023015

• Papers • Previous Articles     Next Articles

Hard-coded backdoor detection method based on semantic conflict

Anxiang HU1, Da XIAO2, Shichen GUO1, Shengli LIU1   

  1. 1 State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450001, China
    2 School of Information Engineering, Zhengzhou University of Industry Technology, Zhengzhou 451100, China
  • Revised:2022-05-11 Online:2023-02-25 Published:2023-02-01
  • Supported by:
    Science&Technology Commission Foundation Strengthening Project(2019-JCJQ-ZD-113)

Abstract:

The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.

Key words: router firmware, hard-coded backdoor, string comparison functions, semantic conflict

CLC Number: 

No Suggested Reading articles found!