The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2019
DOI: 10.1007/978-3-030-29959-0_31
|View full text |Cite
|
Sign up to set email alerts
|

Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic Execution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 22 publications
(14 citation statements)
references
References 16 publications
0
13
1
Order By: Relevance
“…Gerbil [144] is a binary analysis framework to identify privilege separation vulnerabilities. First, it extracts the loading information from IoT firmware to know which MCU model is used in this firmware.…”
Section: Firmware Analysismentioning
confidence: 99%
“…Gerbil [144] is a binary analysis framework to identify privilege separation vulnerabilities. First, it extracts the loading information from IoT firmware to know which MCU model is used in this firmware.…”
Section: Firmware Analysismentioning
confidence: 99%
“…Fig. 1 shows a typical IoT communication system based on our experiments and previous researches [13], [14], [16], [17]. The system consists of three components, an IoT device, a controller and a cloud server.…”
Section: A Architecture Of An Iot Systemmentioning
confidence: 99%
“…As shown in Figure 5, a legitimate user is the ownership of a smart lock with the device ID A, and an attacker owns another IoT device with the device ID B. At this point, if the attacker has access to the same local network with the user's device, he is able to send a set_device_id command to the smart lock, changing the device ID of the smart lock from A to B which has been bound with the attacker's account as revealed in recent research [24].…”
Section: Bug 6: Privilege Separation Logic Bugs In Iot Firmwarementioning
confidence: 99%
“…Thus, the local attackers are able to perform some remote sensitive command C (e.g., setting device ID or unbinding the devices) which should only be sent by cloud. Such unexpected execution paths are called privilege separation vulnerabilities in paper [24]. D. Identifying Method.…”
Section: Bug 6: Privilege Separation Logic Bugs In Iot Firmwarementioning
confidence: 99%
See 1 more Smart Citation