Static analysis for discovering IoT vulnerabilities

被引:38
|
作者
Ferrara, Pietro [1 ,2 ]
Mandal, Amit Kr [3 ]
Cortesi, Agostino [1 ]
Spoto, Fausto [4 ]
机构
[1] Univ Ca Foscari, Venice, Italy
[2] JuliaSoft, Verona, Italy
[3] SRM Univ, Amaravati, AP, India
[4] Univ Verona, Verona, Italy
关键词
IoT security; Static analysis; OWASP IoT Top 10; IoT privacy; Insecure IoT ecosystem interface; SECURITY; INTERNET; FRAMEWORK; PROTOCOLS;
D O I
10.1007/s10009-020-00592-x
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The Open Web Application Security Project (OWASP), released the "OWASP Top 10 Internet of Things 2018" list of the high-priority security vulnerabilities for IoT systems. The diversity of these vulnerabilities poses a great challenge toward development of a robust solution for their detection and mitigation. In this paper, we discuss the relationship between these vulnerabilities and the ones listed by OWASP Top 10 (focused on Web applications rather than IoT systems), how these vulnerabilities can actually be exploited, and in which cases static analysis can help in preventing them. Then, we present an extension of an industrial analyzer (Julia) that already covers five out of the top seven vulnerabilities of OWASP Top 10, and we discuss which IoT Top 10 vulnerabilities might be detected by the existing analyses or their extension. The experimental results present the application of some existing Julia's analyses and their extension to IoT systems, showing its effectiveness of the analysis of some representative case studies.
引用
收藏
页码:71 / 88
页数:18
相关论文
共 50 条
  • [31] A survey of static code analysis methods for security vulnerabilities detection
    Kulenovic, Melina
    Donko, Dzenana
    2014 37TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2014, : 1381 - 1386
  • [32] Ontology Model-Based Static Analysis of Security Vulnerabilities
    Yu, Lian
    Wu, Shi-Zhong
    Guo, Tao
    Dong, Guo-Wei
    Wan, Cheng-Cheng
    Jing, Yin-Hang
    INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 330 - +
  • [33] Scalable Static Analysis to Detect Security Vulnerabilities: Challenges and Solutions
    Gauthier, Francois
    Keynes, Nathan
    Allen, Nicholas
    Corney, Diane
    Krishnan, Padmanabhan
    2018 IEEE CYBERSECURITY DEVELOPMENT CONFERENCE (SECDEV 2018), 2018, : 134 - 134
  • [34] Finding Fixed Vulnerabilities with Off-the-Shelf Static Analysis
    Dunlap, Trevor
    Thorn, Seaver
    Enck, William
    Reaves, Bradley
    2023 IEEE 8TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P, 2023, : 489 - 505
  • [35] Obfuscating Code Vulnerabilities Against Static Analysis in Android Apps
    Pagano, Francesco
    Verderame, Luca
    Merlo, Alessio
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2024, 2024, 710 : 381 - 395
  • [36] Discovering IoT implications in business and management: A computational thematic analysis
    Delgosha, Mohammad Soltani
    Hajiheydari, Nastaran
    Talafidaryani, Mojtaba
    TECHNOVATION, 2022, 118
  • [37] Modeling and Discovering Vulnerabilities with Code Property Graphs
    Yamaguchi, Fabian
    Golde, Nico
    Arp, Daniel
    Rieck, Konrad
    2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, : 590 - 604
  • [38] Discovering Authorship of Vulnerabilities in Open Source Software
    Ghosh, Krishnendu
    Otero, Damon
    2021 28TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE WORKSHOPS (APSECW 2021), 2021, : 41 - 46
  • [39] VULHUNTER: TOWARD DISCOVERING VULNERABILITIES IN ANDROID APPLICATIONS
    Qian, Chenxiong
    Luo, Xiapu
    Le, Yu
    Gu, Guofei
    IEEE MICRO, 2015, 35 (01) : 44 - 53
  • [40] Formally Discovering and Reproducing Network Protocols Vulnerabilities
    Crochet, Christophe
    Aoga, John
    Legay, Axel
    SECURE IT SYSTEMS, NORDSEC 2024, 2025, 15396 : 424 - 443