Abstract

Internet of Things (IoT) for smart homes enhances convenience; however, it also introduces the risk of the leakage of private data. TOP10 IoT of OWASP 2018 shows that the first vulnerability is ”Weak, easy to predict, or embedded passwords.” This problem poses a risk because a user can not fix, change, or detect a password if it is embedded in firmware because only the developer of the firmware can control an update. In this study, we propose a lightweight method to detect the hardcoded username and password in IoT devices using a static analysis called Socket Search and String Search to protect from first vulnerability from 2018 OWASP TOP 10 for the IoT device. The hardcoded login information can be obtained by comparing the user input with strcmp or strncmp. Previous studies analyzed the symbols of strcmp or strncmp to detect the hardcoded login information. However, those studies required a lot of time because of the usage of complicated algorithms such as symbolic execution. To develop a lightweight algorithm, we focus on a network function, such as the socket symbol in firmware, because the IoT device is compromised when it is invaded by someone via the Internet. We propose two methods to detect the hardcoded login information: string search and socket search. In string search, the algorithm finds a function that uses the strcmp or strncmp symbol. In socket search, the algorithm finds a function that is referenced by the socket symbol. In this experiment, we measured the ability of our proposed method by searching six firmware in the real world that has a backdoor. We ran three methods: string search, socket search, and whole search to compare the two methods. As a result, all methods found login information from five of six firmware and one unexpected password. Our method reduces the analysis time. The whole search generally takes 38 mins to complete, but our methods finish the search in 4-6 min.

Highlights

  • Smart speakers and smart home controllers have become popular

  • Yoda et al [10] proposed two methods to detect the hardcoded login information-string search and socket search. They focused on the string and network function, which are often used by a backdoor

  • We suggested two methods to detect the hardcoded login information-string search and socket search

Read more

Summary

Introduction

Smart speakers and smart home controllers have become popular. The Internet of Things (IoT) device provides services that improve our daily lives and some of these services are provided through the Internet. According to F-Secure’s report, the number of attacks on IoT devices in the first half of 2018 was 231 million, whereas that in. We propose two methods to detect the hardcoded login information by analyzing the firmware, i.e., string search and socket search. String search finds a function that references the strcmp or strncmp symbol, whereas socket search finds a function that has contact with the socket symbol within a certain range and references the strcmp or strncmp symbol. This method was able to detect the first vulnerability listed in the 2018 OWASP TOP 10 for IoT devices. The purpose of the study was to propose the following: Method to detect the first vulnerability according to the top 10 OWASP in 2018. Algorithm to shorten analysis time by characterizing the hardcoded login information

Background
Related Work
Overview
String Search
Socket Search
Method Found Method Missed
Whole Search
Findings
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call