Static analysis for discovering IoT vulnerabilities

被引:38
|
作者
Ferrara, Pietro [1 ,2 ]
Mandal, Amit Kr [3 ]
Cortesi, Agostino [1 ]
Spoto, Fausto [4 ]
机构
[1] Univ Ca Foscari, Venice, Italy
[2] JuliaSoft, Verona, Italy
[3] SRM Univ, Amaravati, AP, India
[4] Univ Verona, Verona, Italy
关键词
IoT security; Static analysis; OWASP IoT Top 10; IoT privacy; Insecure IoT ecosystem interface; SECURITY; INTERNET; FRAMEWORK; PROTOCOLS;
D O I
10.1007/s10009-020-00592-x
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The Open Web Application Security Project (OWASP), released the "OWASP Top 10 Internet of Things 2018" list of the high-priority security vulnerabilities for IoT systems. The diversity of these vulnerabilities poses a great challenge toward development of a robust solution for their detection and mitigation. In this paper, we discuss the relationship between these vulnerabilities and the ones listed by OWASP Top 10 (focused on Web applications rather than IoT systems), how these vulnerabilities can actually be exploited, and in which cases static analysis can help in preventing them. Then, we present an extension of an industrial analyzer (Julia) that already covers five out of the top seven vulnerabilities of OWASP Top 10, and we discuss which IoT Top 10 vulnerabilities might be detected by the existing analyses or their extension. The experimental results present the application of some existing Julia's analyses and their extension to IoT systems, showing its effectiveness of the analysis of some representative case studies.
引用
收藏
页码:71 / 88
页数:18
相关论文
共 50 条
  • [21] Searching for Taint Vulnerabilities with Svace Static Analysis Tool
    A. E. Borodin
    A. V. Goremykin
    S. P. Vartanov
    A. A. Belevantsev
    Programming and Computer Software, 2021, 47 : 466 - 481
  • [22] DIVINA: Discovering Vulnerabilities of Internet Accounts
    Ismail, Ziad
    Symeonidou, Danai
    Suchanek, Fabian
    WWW'15 COMPANION: PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB, 2015, : 203 - 206
  • [23] Hybrid Firmware Analysis for Known Mobile and IoT Security Vulnerabilities
    Sun, Pengfei
    Garcia, Luis
    Salles-Loustau, Gabriel
    Zonouz, Saman
    2020 50TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2020), 2020, : 373 - 384
  • [24] On the Design of IoT Security: Analysis of Software Vulnerabilities for Smart Grids
    Mathas, Christos-Minas
    Vassilakis, Costas
    Kolokotronis, Nicholas
    Zarakovitis, Charilaos C.
    Kourtis, Michail-Alexandros
    ENERGIES, 2021, 14 (10)
  • [25] Discovering software vulnerabilities using data-flow analysis and machine learning
    Kronjee, Jorrit
    Hommersom, Arjen
    Vranken, Harald
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [26] An Empirical Study of Docker Vulnerabilities and of Static Code Analysis Applicability
    Duarte, Ana
    Antunes, Nuno
    2018 EIGHTH LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE COMPUTING (LADC), 2018, : 27 - 36
  • [27] Finding security vulnerabilities in Java']Java applications with static analysis
    Livshits, VB
    Lam, MS
    USENIX ASSOCIATION PROCEEDINGS OF THE 14TH USENIX SECURITY SYMPOSIUM, 2005, : 271 - 286
  • [28] How to Find and Fix Software Vulnerabilities with Coverity Static Analysis
    Baloglu, Bill
    2016 IEEE CYBERSECURITY DEVELOPMENT (IEEE SECDEV 2016), 2016, : 153 - 153
  • [29] Static analysis method for detecting cross site scripting vulnerabilities
    Usha G.
    Kannimuthu S.
    Mahendiran P.D.
    Shanker A.K.
    Venugopal D.
    International Journal of Information and Computer Security, 2020, 13 (01): : 32 - 47
  • [30] Finding Fixed Vulnerabilities with Off-the-Shelf Static Analysis
    Dunlap, Trevor
    Thorn, Seaver
    Enck, William
    Reaves, Bradley
    Proceedings - 8th IEEE European Symposium on Security and Privacy, Euro S and P 2023, 2023, : 489 - 505