Cutting through the complexity of reverse engineering embedded devices

被引:0
|
作者
Thomas S.L. [1 ]
Van den Herrewegen J. [1 ]
Vasilakis G. [1 ]
Chen Z. [1 ]
Ordean M. [1 ]
Garcia F.D. [1 ]
机构
[1] University of Birmingham, Birmingham
关键词
Embedded device firmware; Hardware-based execution tracing; Reverse engineering;
D O I
10.46586/tches.v2021.i3.360-389
中图分类号
学科分类号
摘要
Performing security analysis of embedded devices is a challenging task. They present many difficulties not usually found when analyzing commodity systems: undocumented peripherals, esoteric instruction sets, and limited tool support. Thus, a significant amount of reverse engineering is almost always required to analyze such devices. In this paper, we present Incision, an architecture and operating-system agnostic reverse engineering framework. Incision tackles the problem of reducing the upfront effort to analyze complex end-user devices. It combines static and dynamic analyses in a feedback loop, enabling information from each to be used in tandem to improve our overall understanding of the firmware analyzed. We use Incision to analyze a variety of devices and firmware. Our evaluation spans firmware based on three RTOSes, an automotive ECU, and a 4G/LTE baseband. We demonstrate that Incision does not introduce significant complexity to the standard reverse engineering process and requires little manual effort to use. Moreover, its analyses produce correct results with high confidence and are robust across different OSes and ISAs. © 2021, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:360 / 389
页数:29
相关论文
共 50 条
  • [1] Reverse engineering of biological complexity
    Csete, ME
    Doyle, JC
    SCIENCE, 2002, 295 (5560) : 1664 - 1669
  • [2] CUTTING THROUGH DBMS COMPLEXITY
    KULL, D
    COMPUTER DECISIONS, 1989, 21 (04): : 23 - 24
  • [3] SensorLoader: Bridging the Gap in Cyber-Physical Reverse Engineering Across Embedded Peripheral Devices
    Dasbach-Prisk, AnMei
    DeWitt, Cory
    Garcia, Luis
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY OF SENSING SYSTEMS, SENSORS S&P 2023, 2023, : 30 - 36
  • [4] Reverse Engineering of Some Cardiovascular Devices
    Rafiroiu, D.
    Iancu, A.
    Lazar, A.
    Tiseanu, I.
    Craciunescu, T.
    Hart, J.
    INTERNATIONAL CONFERENCE ON ADVANCEMENTS OF MEDICINE AND HEALTH CARE THROUGH TECHNOLOGY, 2009, 26 : 369 - +
  • [5] Reverse-engineering Embedded Memory Controllers through Latency-based Analysis
    Hassan, Mohamed
    Kaushik, Anirudh M.
    Patel, Hiren
    21ST IEEE REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM (RTAS 2015), 2015, : 297 - 306
  • [6] Cutting through the complexity of cell collectives
    Nadell, Carey D.
    Bucci, Vanni
    Drescher, Knut
    Levin, Simon A.
    Bassler, Bonnie L.
    Xavier, Joao B.
    PROCEEDINGS OF THE ROYAL SOCIETY B-BIOLOGICAL SCIENCES, 2013, 280 (1755)
  • [7] Measuring the complexity of class diagrams in reverse engineering
    Sheldon, Frederick T.
    Chung, Hong
    JOURNAL OF SOFTWARE MAINTENANCE AND EVOLUTION-RESEARCH AND PRACTICE, 2006, 18 (05): : 333 - 350
  • [8] Secure embedded systems: the threat of reverse engineering
    McLoughlin, Ian
    PROCEEDINGS OF THE 2008 14TH IEEE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, 2008, : 729 - 736
  • [9] Reverse Engineering Algorithm for Cutting of Ruled Geometries by Wire
    Beaucamp, Anthony T. H.
    Takeuchi, Yoshimi
    INTERNATIONAL JOURNAL OF AUTOMATION TECHNOLOGY, 2022, 16 (03) : 349 - 355
  • [10] Reverse Engineering based Methodology for Modelling Cutting Tools
    Valerga, A. P.
    Batista, M.
    Bienvenido, R.
    Fernandez-Vidal, S. R.
    Wendt, C.
    Marcos, M.
    MESIC MANUFACTURING ENGINEERING SOCIETY INTERNATIONAL CONFERENCE 2015, 2015, 132 : 1144 - 1151