Skip to main content
Top

2018 | OriginalPaper | Chapter

Association Analysis of Firmware Based on NoSQL Database

Authors : Gongbo Wang, Weiyu Dong, Rui Chang

Published in: Cloud Computing and Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the continuous expanding of the Internet of Things, the security of networked embedded devices attracts much attention. Large scale embedded device firmware provides basic data for automated and artificial intelligent analysis method. Thus, an association analysis method for the large scale firmware security is proposed in this paper. Then, a firmware database platform based on the proposed analysis method is developed. First, the platform can complete the mainline of embedded device firmware crawl with its web crawler program. Then, a firmware NoSQL database including the firmware and its information (such as its vendor, product, version, URL, files, etc.) is formed. Last, the firmware analysis method is applied on the database by matching the hashes of the web files and programs in the firmware file system with vulnerability file. The experimental result shows that the proposed method is effective and efficient.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Bellard, F.: QEMU, a fast and portable dynamic translator. In: USENIX Annual Technical Conference, FREENIX Track, vol. 41, p. 46 (2005) Bellard, F.: QEMU, a fast and portable dynamic translator. In: USENIX Annual Technical Conference, FREENIX Track, vol. 41, p. 46 (2005)
2.
go back to reference Chen, D., Woo, M., Brumley, D., Egele, M.: Towards automated dynamic analysis for Linux-based embedded firmware. In: Network and Distributed System Security Symposium (2016) Chen, D., Woo, M., Brumley, D., Egele, M.: Towards automated dynamic analysis for Linux-based embedded firmware. In: Network and Distributed System Security Symposium (2016)
3.
go back to reference Zaddach, J., Bruno, L., Francillon, A., Balzarotti, D.: Avatar: a framework to support dynamic security analysis of embedded systems’ firmwares. In: Network and Distributed System Security Symposium (2015) Zaddach, J., Bruno, L., Francillon, A., Balzarotti, D.: Avatar: a framework to support dynamic security analysis of embedded systems’ firmwares. In: Network and Distributed System Security Symposium (2015)
5.
go back to reference Feng, Q., Zhou, R., Xu C., Cheng, Y., Testa, B., Yin, H.: Scalable graph-based bug search for firmware images. In: ACM SIGSAC Conference on Computer and Communications Security, pp. 480–491. ACM (2016) Feng, Q., Zhou, R., Xu C., Cheng, Y., Testa, B., Yin, H.: Scalable graph-based bug search for firmware images. In: ACM SIGSAC Conference on Computer and Communications Security, pp. 480–491. ACM (2016)
6.
go back to reference Xu, X., Liu, C., Feng, Q., Yin, H., Song, L., Song, D.: Neural network-based graph embedding for cross-platform binary code similarity detection. In: CCS 2017 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 363–376. ACM, New York (2017) Xu, X., Liu, C., Feng, Q., Yin, H., Song, L., Song, D.: Neural network-based graph embedding for cross-platform binary code similarity detection. In: CCS 2017 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 363–376. ACM, New York (2017)
7.
go back to reference Chodorow, K., Dirolf, M.: MongoDB: the definitive guide: powerful and scalable data storage. DBLP (2010) Chodorow, K., Dirolf, M.: MongoDB: the definitive guide: powerful and scalable data storage. DBLP (2010)
9.
go back to reference Zhu, X., Yin, Q., Chang, R.: Structured feature library-based progressive firmware format parsing. J. Wuhan Univ. (2017) Zhu, X., Yin, Q., Chang, R.: Structured feature library-based progressive firmware format parsing. J. Wuhan Univ. (2017)
11.
go back to reference Hoglund, G.: Fuzzy hash algorithm. US, US 8484152 B2 (2013) Hoglund, G.: Fuzzy hash algorithm. US, US 8484152 B2 (2013)
Metadata
Title
Association Analysis of Firmware Based on NoSQL Database
Authors
Gongbo Wang
Weiyu Dong
Rui Chang
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-030-00018-9_9

Premium Partner