Muhammad Shaharyar Yaqub, Haroon Mahmood, Ibrahim Nadir, G. Shah
{"title":"An Ensemble Approach for IoT Firmware Strength Analysis using STRIDE Threat Modeling and Reverse Engineering","authors":"Muhammad Shaharyar Yaqub, Haroon Mahmood, Ibrahim Nadir, G. Shah","doi":"10.1109/INMIC56986.2022.9972941","DOIUrl":null,"url":null,"abstract":"Internet of Things (IoT) market is growing exponentially and automated smart solutions are revolutionizing a diverse range of areas with innovative technologies. The most critical and vital part of an IoT system that cannot be overlooked at any cost is its security. The security standards for IoT devices are not mature enough to provide foolproof security and there is still a long journey for manufacturers to incorporate stealth in devices. The most vulnerable component of an IoT system is the firmware which controls all the functionality of the device. If subverted by an attacker, the firmware of the IoT device can prove to be a critical attack surface for obtaining enough information to annihilate an IoT device. In this paper, we propose a twofold strategy to critically analyze the security of an IoT firmware. We will first use the STRIDE threat model to identify the security parameters that attackers could exploit to launch attacks. We will then use reverse engineering to examine and evaluate the security of a wide range of firmware being used in the latest and most commonly used IoT devices based on the identified security parameters. The same parameters can then derive security expectations for a secure IoT firmware. The proposed approach provides a powerful strategy to comprehensively analyze an IoT system's security. Our experimental results show that more than 50 percent of the firmware are exposing critical information that can be used to launch attacks. We believe that our findings will also help establish recommendations for developing secure and resilient firmware.","PeriodicalId":404424,"journal":{"name":"2022 24th International Multitopic Conference (INMIC)","volume":"2007 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 24th International Multitopic Conference (INMIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INMIC56986.2022.9972941","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Internet of Things (IoT) market is growing exponentially and automated smart solutions are revolutionizing a diverse range of areas with innovative technologies. The most critical and vital part of an IoT system that cannot be overlooked at any cost is its security. The security standards for IoT devices are not mature enough to provide foolproof security and there is still a long journey for manufacturers to incorporate stealth in devices. The most vulnerable component of an IoT system is the firmware which controls all the functionality of the device. If subverted by an attacker, the firmware of the IoT device can prove to be a critical attack surface for obtaining enough information to annihilate an IoT device. In this paper, we propose a twofold strategy to critically analyze the security of an IoT firmware. We will first use the STRIDE threat model to identify the security parameters that attackers could exploit to launch attacks. We will then use reverse engineering to examine and evaluate the security of a wide range of firmware being used in the latest and most commonly used IoT devices based on the identified security parameters. The same parameters can then derive security expectations for a secure IoT firmware. The proposed approach provides a powerful strategy to comprehensively analyze an IoT system's security. Our experimental results show that more than 50 percent of the firmware are exposing critical information that can be used to launch attacks. We believe that our findings will also help establish recommendations for developing secure and resilient firmware.