Cutting through the complexity of reverse engineering embedded devices

被引:0
|
作者
Thomas S.L. [1 ]
Van den Herrewegen J. [1 ]
Vasilakis G. [1 ]
Chen Z. [1 ]
Ordean M. [1 ]
Garcia F.D. [1 ]
机构
[1] University of Birmingham, Birmingham
关键词
Embedded device firmware; Hardware-based execution tracing; Reverse engineering;
D O I
10.46586/tches.v2021.i3.360-389
中图分类号
学科分类号
摘要
Performing security analysis of embedded devices is a challenging task. They present many difficulties not usually found when analyzing commodity systems: undocumented peripherals, esoteric instruction sets, and limited tool support. Thus, a significant amount of reverse engineering is almost always required to analyze such devices. In this paper, we present Incision, an architecture and operating-system agnostic reverse engineering framework. Incision tackles the problem of reducing the upfront effort to analyze complex end-user devices. It combines static and dynamic analyses in a feedback loop, enabling information from each to be used in tandem to improve our overall understanding of the firmware analyzed. We use Incision to analyze a variety of devices and firmware. Our evaluation spans firmware based on three RTOSes, an automotive ECU, and a 4G/LTE baseband. We demonstrate that Incision does not introduce significant complexity to the standard reverse engineering process and requires little manual effort to use. Moreover, its analyses produce correct results with high confidence and are robust across different OSes and ISAs. © 2021, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:360 / 389
页数:29
相关论文
共 50 条
  • [31] Gaze tracking embedded collaborative robots for automated metrology and reverse engineering
    Karunathilake, Sachithra
    Forhad, Md Shahriar
    Geng, Zhaohui
    Manufacturing Letters, 2024, 41 : 1488 - 1498
  • [32] An introduction to engineering through an integrated reverse engineering and design graphics project
    Barr, Ronald E.
    Schmidt, Philip S.
    Krueger, Thomas J.
    Twu, Chu-Yun
    Journal of Engineering Education, 2000, 89 (04) : 413 - 418
  • [33] Anomaly Detection in Embedded Devices Through Hardware Introspection
    Reyes, David Llanio
    Perez-Pons, Alexander
    Dean, Rogelio Bofill
    2023 SILICON VALLEY CYBERSECURITY CONFERENCE, SVCC, 2023,
  • [34] Services and networks management through embedded devices and SOA
    Gilart-Iglesias, Virgilio
    Macia-Perez, Francisco
    Gil-Martinez-Abarca, Juan Antonio
    Marcos-Jorquera, Diego
    10TH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE, PROCEEDINGS, 2006, : 395 - 398
  • [35] Video streaming on embedded devices through GPRS network
    Lim, KP
    Wu, D
    Wu, S
    Susanto, R
    Lin, X
    Jiang, L
    Yu, R
    Pan, F
    Yao, S
    Feng, G
    Ko, CC
    2003 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOL II, PROCEEDINGS, 2003, : 169 - 172
  • [36] Reverse engineering is reverse forward engineering
    Baxter, ID
    Mehlich, M
    SCIENCE OF COMPUTER PROGRAMMING, 2000, 36 (2-3) : 131 - 147
  • [37] Reverse engineering is reverse forward engineering
    Baxter, ID
    Mehlich, M
    PROCEEDINGS OF THE FOURTH WORKING CONFERENCE ON REVERSE ENGINEERING, 1997, : 104 - 113
  • [38] Reverse Complexity
    Asperti, Andrea
    JOURNAL OF AUTOMATED REASONING, 2015, 55 (04) : 373 - 388
  • [39] Reverse Complexity
    Andrea Asperti
    Journal of Automated Reasoning, 2015, 55 : 373 - 388
  • [40] Reverse Complexity
    Asperti, Andrea (asperti@cs.unibo.it), 1600, Springer Science and Business Media B.V. (55):