{"title":"Framework to analyze and exploit the smart home IoT firmware","authors":"Keshav Kaushik , Akashdeep Bhardwaj , Susheela Dahiya","doi":"10.1016/j.measen.2024.101406","DOIUrl":null,"url":null,"abstract":"<div><div>Thousands of smart gadgets are linked to the internet each month, and due to various privacy and security issues, such devices may be vulnerable to evil attackers. Currently, there are around 8 billion devices online, and by the beginning of 2025, there will likely be 25 to 35 billion IoT devices globally. Despite this, the security of the devices is not receiving any more attention. Since operating system (OS) and hardware security have improved recently, researchers and hackers now seek vulnerabilities in other areas, such as firmware. When the firmware on many IoT devices isn't updated, it leaves them open to cyberattacks. The period when the Mirai Botnet was widely used is one of the situations in which we may have heard about firmware security. By gaining access to the equipment using the default credentials, the Mirai Botnet infects devices. Therefore, to analyze the firmware's contents for alteration during runtime, the authors of this research performed reverse engineering on it. Authors have exploited the smart home IoT firmware using our framework that identified ten critical network-based vulnerabilities within the firmware, with five vulnerabilities scoring a maximum CVSS score of 10.0 and the remaining five scoring 9.8, highlighting significant threats to smart home IoT devices. In addition, examining the firmware binaries demonstrates the widespread usage of dangerous functions like sprintf and strcpy in addition to the absence of critical security features like NX, PIE, RELRO, and stack protection. By offering a thorough analysis of the vulnerabilities and suggesting best practices for boosting the security of smart home IoT firmware, the results add to the body of information already in existence.</div></div>","PeriodicalId":34311,"journal":{"name":"Measurement Sensors","volume":"37 ","pages":"Article 101406"},"PeriodicalIF":0.0000,"publicationDate":"2024-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Measurement Sensors","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2665917424003829","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Engineering","Score":null,"Total":0}
引用次数: 0
Abstract
Thousands of smart gadgets are linked to the internet each month, and due to various privacy and security issues, such devices may be vulnerable to evil attackers. Currently, there are around 8 billion devices online, and by the beginning of 2025, there will likely be 25 to 35 billion IoT devices globally. Despite this, the security of the devices is not receiving any more attention. Since operating system (OS) and hardware security have improved recently, researchers and hackers now seek vulnerabilities in other areas, such as firmware. When the firmware on many IoT devices isn't updated, it leaves them open to cyberattacks. The period when the Mirai Botnet was widely used is one of the situations in which we may have heard about firmware security. By gaining access to the equipment using the default credentials, the Mirai Botnet infects devices. Therefore, to analyze the firmware's contents for alteration during runtime, the authors of this research performed reverse engineering on it. Authors have exploited the smart home IoT firmware using our framework that identified ten critical network-based vulnerabilities within the firmware, with five vulnerabilities scoring a maximum CVSS score of 10.0 and the remaining five scoring 9.8, highlighting significant threats to smart home IoT devices. In addition, examining the firmware binaries demonstrates the widespread usage of dangerous functions like sprintf and strcpy in addition to the absence of critical security features like NX, PIE, RELRO, and stack protection. By offering a thorough analysis of the vulnerabilities and suggesting best practices for boosting the security of smart home IoT firmware, the results add to the body of information already in existence.