论文标题
关于基于Linux的物联网系统的手动逆向工程通信协议
On Manually Reverse Engineering Communication Protocols of Linux Based IoT Systems
论文作者
论文摘要
物联网安全和隐私引起了严重的关注。已经为设计和理解物联网系统漏洞的工具做出了努力。大多数现有协议安全分析技术都依赖于对基础通信协议的良好理解。在本文中,我们系统地介绍了第一个手动反向工程框架,用于发现基于Linux的IoT系统的通信协议。我们已经成功地应用了我们的框架来逆转许多物联网系统。例如,我们通过从Flash中提取固件,对固件进行静态而动态的分析并分析网络流量来详细使用框架逆转WEMO智能插件通信协议。发现的协议暴露了严重的设计缺陷,允许攻击者控制或否认受害者插头的服务。我们的手动逆向工程框架是通用的,可以应用于只读和可写的嵌入Linux文件系统。
IoT security and privacy has raised grave concerns. Efforts have been made to design tools to identify and understand vulnerabilities of IoT systems. Most of the existing protocol security analysis techniques rely on a well understanding of the underlying communication protocols. In this paper, we systematically present the first manual reverse engineering framework for discovering communication protocols of embedded Linux based IoT systems. We have successfully applied our framework to reverse engineer a number of IoT systems. As an example, we present a detailed use of the framework reverse-engineering the WeMo smart plug communication protocol by extracting the firmware from the flash, performing static and dynamic analysis of the firmware and analyzing network traffic. The discovered protocol exposes severe design flaws that allow attackers to control or deny the service of victim plugs. Our manual reverse engineering framework is generic and can be applied to both read-only and writable Embedded Linux filesystems.