Cargando…

Automated Vulnerability Discovery and Exploitation in the Internet of Things †

Recently, automated software vulnerability detection and exploitation in Internet of Things (IoT) has attracted more and more attention, due to IoT’s fast adoption and high social impact. However, the task is challenging and the solutions are non-trivial: the existing methods have limited effectiven...

Descripción completa

Detalles Bibliográficos
Autores principales: Wang, Zhongru, Zhang, Yuntao, Tian, Zhihong, Ruan, Qiang, Liu, Tong, Wang, Haichen, Liu, Zhehui, Lin, Jiayi, Fang, Binxing, Shi, Wei
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6696294/
https://www.ncbi.nlm.nih.gov/pubmed/31370171
http://dx.doi.org/10.3390/s19153362
_version_ 1783444236723552256
author Wang, Zhongru
Zhang, Yuntao
Tian, Zhihong
Ruan, Qiang
Liu, Tong
Wang, Haichen
Liu, Zhehui
Lin, Jiayi
Fang, Binxing
Shi, Wei
author_facet Wang, Zhongru
Zhang, Yuntao
Tian, Zhihong
Ruan, Qiang
Liu, Tong
Wang, Haichen
Liu, Zhehui
Lin, Jiayi
Fang, Binxing
Shi, Wei
author_sort Wang, Zhongru
collection PubMed
description Recently, automated software vulnerability detection and exploitation in Internet of Things (IoT) has attracted more and more attention, due to IoT’s fast adoption and high social impact. However, the task is challenging and the solutions are non-trivial: the existing methods have limited effectiveness at discovering vulnerabilities capable of compromising IoT systems. To address this, we propose an Automated Vulnerability Discovery and Exploitation framework with a Scheduling strategy, AutoDES that aims to improve the efficiency and effectiveness of vulnerability discovery and exploitation. In the vulnerability discovery stage, we use our Anti-Driller technique to mitigate the “path explosion” problem. This approach first generates a specific input proceeding from symbolic execution based on a Control Flow Graph (CFG). It then leverages a mutation-based fuzzer to find vulnerabilities while avoiding invalid mutations. In the vulnerability exploitation stage, we analyze the characteristics of vulnerabilities and then propose to generate exploits, via the use of several proposed attack techniques that can produce a shell based on the detected vulnerabilities. We also propose a genetic algorithm (GA)-based scheduling strategy (AutoS) that helps with assigning the computing resources dynamically and efficiently. The extensive experimental results on the RHG 2018 challenge dataset and the BCTF-RHG 2019 challenge dataset clearly demonstrate the effectiveness and efficiency of the proposed framework.
format Online
Article
Text
id pubmed-6696294
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-66962942019-09-05 Automated Vulnerability Discovery and Exploitation in the Internet of Things † Wang, Zhongru Zhang, Yuntao Tian, Zhihong Ruan, Qiang Liu, Tong Wang, Haichen Liu, Zhehui Lin, Jiayi Fang, Binxing Shi, Wei Sensors (Basel) Article Recently, automated software vulnerability detection and exploitation in Internet of Things (IoT) has attracted more and more attention, due to IoT’s fast adoption and high social impact. However, the task is challenging and the solutions are non-trivial: the existing methods have limited effectiveness at discovering vulnerabilities capable of compromising IoT systems. To address this, we propose an Automated Vulnerability Discovery and Exploitation framework with a Scheduling strategy, AutoDES that aims to improve the efficiency and effectiveness of vulnerability discovery and exploitation. In the vulnerability discovery stage, we use our Anti-Driller technique to mitigate the “path explosion” problem. This approach first generates a specific input proceeding from symbolic execution based on a Control Flow Graph (CFG). It then leverages a mutation-based fuzzer to find vulnerabilities while avoiding invalid mutations. In the vulnerability exploitation stage, we analyze the characteristics of vulnerabilities and then propose to generate exploits, via the use of several proposed attack techniques that can produce a shell based on the detected vulnerabilities. We also propose a genetic algorithm (GA)-based scheduling strategy (AutoS) that helps with assigning the computing resources dynamically and efficiently. The extensive experimental results on the RHG 2018 challenge dataset and the BCTF-RHG 2019 challenge dataset clearly demonstrate the effectiveness and efficiency of the proposed framework. MDPI 2019-07-31 /pmc/articles/PMC6696294/ /pubmed/31370171 http://dx.doi.org/10.3390/s19153362 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Wang, Zhongru
Zhang, Yuntao
Tian, Zhihong
Ruan, Qiang
Liu, Tong
Wang, Haichen
Liu, Zhehui
Lin, Jiayi
Fang, Binxing
Shi, Wei
Automated Vulnerability Discovery and Exploitation in the Internet of Things †
title Automated Vulnerability Discovery and Exploitation in the Internet of Things †
title_full Automated Vulnerability Discovery and Exploitation in the Internet of Things †
title_fullStr Automated Vulnerability Discovery and Exploitation in the Internet of Things †
title_full_unstemmed Automated Vulnerability Discovery and Exploitation in the Internet of Things †
title_short Automated Vulnerability Discovery and Exploitation in the Internet of Things †
title_sort automated vulnerability discovery and exploitation in the internet of things †
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6696294/
https://www.ncbi.nlm.nih.gov/pubmed/31370171
http://dx.doi.org/10.3390/s19153362
work_keys_str_mv AT wangzhongru automatedvulnerabilitydiscoveryandexploitationintheinternetofthings
AT zhangyuntao automatedvulnerabilitydiscoveryandexploitationintheinternetofthings
AT tianzhihong automatedvulnerabilitydiscoveryandexploitationintheinternetofthings
AT ruanqiang automatedvulnerabilitydiscoveryandexploitationintheinternetofthings
AT liutong automatedvulnerabilitydiscoveryandexploitationintheinternetofthings
AT wanghaichen automatedvulnerabilitydiscoveryandexploitationintheinternetofthings
AT liuzhehui automatedvulnerabilitydiscoveryandexploitationintheinternetofthings
AT linjiayi automatedvulnerabilitydiscoveryandexploitationintheinternetofthings
AT fangbinxing automatedvulnerabilitydiscoveryandexploitationintheinternetofthings
AT shiwei automatedvulnerabilitydiscoveryandexploitationintheinternetofthings