Inicio  /  Applied Sciences  /  Vol: 10 Par: 11 (2020)  /  Artículo
ARTÍCULO
TITULO

EWVHunter: Grey-Box Fuzzing with Knowledge Guide on Embedded Web Front-Ends

Enze Wang    
Baosheng Wang    
Wei Xie    
Zhenhua Wang    
Zhenhao Luo and Tai Yue    

Resumen

At present, embedded devices have become a part of people?s lives, so detecting security vulnerabilities contained in devices becomes imperative. There are three challenges in detecting embedded device vulnerabilities: (1) Most network protocols are stateful; (2) the communication between the web front-end and the device is encrypted or encoded; and (3) the conditional constraints of programs in the device reduce the depth and breadth of fuzz testing. To address these challenges, we propose a new type of gray-box fuzz testing framework in this paper, called EWVHunter, which is mainly used to find authentication bypass and command injection vulnerabilities in embedded devices. The key idea in this paper is based on the observation that most embedded devices are controlled through the web front-end. Such embedded devices often contain rich information in the communication protocol between the web front-end and device. Therefore, by filling data at the input source on the web front-end and reusing web front-end program logic, we can effectively solve the impact of the stateful network protocol and communication data encryption on fuzzing without relying on any knowledge about the communication protocol. Additionally, we use firmware information extraction to enhance EWVHunter so that it can detect vulnerabilities in deep layer codes and hidden interfaces. In our research, we implemented EWVHunter and evaluated 8 real-world embedded devices, and our approach identified 12 vulnerabilities (including 7 zero-days), which affect a total of 31,996 online devices.

 Artículos similares

       
 
Dinesh Nagumothu, Peter W. Eklund, Bahadorreza Ofoghi and Mohamed Reda Bouadjenek    
Standardized approaches to relevance classification in information retrieval use generative statistical models to identify the presence or absence of certain topics that might make a document relevant to the searcher. These approaches have been used to b... ver más
Revista: Applied Sciences

 
Mohammad Ebrahim Bajgholi, Gilles Rousseau, Martin Viens and Denis Thibault    
This paper presents the results of a project aimed at evaluating the performance of ultrasonic techniques for detecting flaws in Francis turbine runners. This work is the first phase of a more ambitious program aimed at improving the reliability of inspe... ver más
Revista: Applied Sciences

 
Su Xie, Ke Li, Mingming Xiao, Le Zhang and Wanlin Li    
In this paper, the prediction of over-the-top service quality is discussed, which is a promising way for mobile network engineers to tackle service deterioration as early as possible. Currently, traditional mobile network operation often takes appropriat... ver más
Revista: Applied Sciences

 
Mohammad Ali A. Hammoudeh,Ajlan S. Al-Ajlan     Pág. pp. 35 - 45
Recently, the utilization of IT in the Higher Education institutions has expanded, thus e-Learning must to turn out to be completely embedded into e-Learning and showing practice rather than the traditional approaches to e-Learning. However, this develop... ver más

 
Camila Vaccari Sundermann, Marcos Aurélio Domingues, Roberta Akemi Sinoara, Ricardo Marcondes Marcacini and Solange Oliveira Rezende    
Recommender systems help users by recommending items, such as products and services, that can be of interest to these users. Context-aware recommender systems have been widely investigated in both academia and industry because they can make recommendatio... ver más
Revista: Information