{"title":"A machine learning framework for inferring properties of embedded devices","authors":"Shariq Bashir","doi":"10.1016/j.adhoc.2025.103907","DOIUrl":null,"url":null,"abstract":"<div><div>Nowadays, the prevalence of Internet of Things (IoT) devices has increased in our homes and workplaces, providing us with more convenience. However, the security of these devices is often compromised. The objective of this paper is to assess the security of embedded IoT devices. Existing passive fingerprinting approaches are inapplicable in the configuration when the network traffic of devices connected to an IoT hub is inaccessible. We proposed a firmware analysis technique for analyzing devices’ security by inspecting their firmware contents. Our aim is not to identify unknown vulnerabilities, but only those that are already known. We also intend to investigate whether the software that is executing services is outdated or not. Precise information regarding the name and version of servers, as well as login credentials and passwords, can be obtained through the analysis of firmware. Having obtained this information, we have created an active identification technique that enables an attacker to deduce specific characteristics of a connected device, such as the name of the software employed for the HTTP server or usernames. Our method involves training a classifier using data extracted from firmware. The results of our experiments indicate that our approach is more effective and covert compared to a brute-force method. We scrutinized 5,204 firmware of devices using our approach. Our findings suggest that the level of exposure of connected devices has grown in recent years. As connected devices become more open to services, it increases the potential attack surface while reducing their security.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"177 ","pages":"Article 103907"},"PeriodicalIF":4.8000,"publicationDate":"2025-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Ad Hoc Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1570870525001556","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Nowadays, the prevalence of Internet of Things (IoT) devices has increased in our homes and workplaces, providing us with more convenience. However, the security of these devices is often compromised. The objective of this paper is to assess the security of embedded IoT devices. Existing passive fingerprinting approaches are inapplicable in the configuration when the network traffic of devices connected to an IoT hub is inaccessible. We proposed a firmware analysis technique for analyzing devices’ security by inspecting their firmware contents. Our aim is not to identify unknown vulnerabilities, but only those that are already known. We also intend to investigate whether the software that is executing services is outdated or not. Precise information regarding the name and version of servers, as well as login credentials and passwords, can be obtained through the analysis of firmware. Having obtained this information, we have created an active identification technique that enables an attacker to deduce specific characteristics of a connected device, such as the name of the software employed for the HTTP server or usernames. Our method involves training a classifier using data extracted from firmware. The results of our experiments indicate that our approach is more effective and covert compared to a brute-force method. We scrutinized 5,204 firmware of devices using our approach. Our findings suggest that the level of exposure of connected devices has grown in recent years. As connected devices become more open to services, it increases the potential attack surface while reducing their security.
期刊介绍:
The Ad Hoc Networks is an international and archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in ad hoc and sensor networking areas. The Ad Hoc Networks considers original, high quality and unpublished contributions addressing all aspects of ad hoc and sensor networks. Specific areas of interest include, but are not limited to:
Mobile and Wireless Ad Hoc Networks
Sensor Networks
Wireless Local and Personal Area Networks
Home Networks
Ad Hoc Networks of Autonomous Intelligent Systems
Novel Architectures for Ad Hoc and Sensor Networks
Self-organizing Network Architectures and Protocols
Transport Layer Protocols
Routing protocols (unicast, multicast, geocast, etc.)
Media Access Control Techniques
Error Control Schemes
Power-Aware, Low-Power and Energy-Efficient Designs
Synchronization and Scheduling Issues
Mobility Management
Mobility-Tolerant Communication Protocols
Location Tracking and Location-based Services
Resource and Information Management
Security and Fault-Tolerance Issues
Hardware and Software Platforms, Systems, and Testbeds
Experimental and Prototype Results
Quality-of-Service Issues
Cross-Layer Interactions
Scalability Issues
Performance Analysis and Simulation of Protocols.