Journal on Communications ›› 2013, Vol. 34 ›› Issue (8): 140-145.doi: 10.3969/j.issn.1000-436x.2013.08.018

• Technical Reports • Previous Articles     Next Articles

Backdoor detection in embedded system firmware without file system

Chao-jian HU1,2,Yi-bo XUE1,Liang ZHAO2,Zhou-jun LI3   

  1. 1 Research Institute of Information Technology,Tsinghua University,Beijing 100084,China
    2 NSFOCUS,Beijing 100089,China
    3 School of Computer Science &Engineering,Beihang University,Beijing 100191,China
  • Online:2013-08-25 Published:2017-08-31
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The Technology Major Project of the Ministry of Science and Technology of China

Abstract:

Any embedded system firmware without file system will integrate its system code and user application code into a single file.This setting has brought some additional difficulties to analyze them.Aimed at this kind of firmware,the problem of library function identification was analyzed,and several heuristic methods to recognize some important function relevant with manipulating network socket and character string / memory were proposed.Based on this analysis,the backdoor detection problem of some typical types including unauthorized listener,unintended function,hidden function,outward connection request etc.were discussed,and several backdoors (one is critical level) in a real world firmware were found.The result shows this method of identifying library function can be useful for security analysis to this type of firmware.

Key words: embedded system, firmware, file system, library function identification, backdoor detection

No Suggested Reading articles found!