A Large-Scale Analysis of the Security of Embedded...

22
A Large-Scale Analysis of the Security of Embedded Firmwares Andrei Cos+n, Jonas Zaddach, Aurélien Francillon, and Davide Balzaro:, Eurecom h;ps://www.usenix.org/conference/usenixsecurity14/technical-sessions/presenta+on/ cos+n Saeid Mofrad

Transcript of A Large-Scale Analysis of the Security of Embedded...

Page 1: A Large-Scale Analysis of the Security of Embedded Firmwareswebpages.eng.wayne.edu/~fy8421/16fa-csc6991/slides/21-FirmwareSecurity.pdfINTRODUCTION: Embedded systems: -Embedded system

A Large-Scale Analysis of the Security of Embedded Firmwares

AndreiCos+n,JonasZaddach,AurélienFrancillon,andDavideBalzaro:,Eurecomh;ps://www.usenix.org/conference/usenixsecurity14/technical-sessions/presenta+on/cos+n

SaeidMofrad

Page 2: A Large-Scale Analysis of the Security of Embedded Firmwareswebpages.eng.wayne.edu/~fy8421/16fa-csc6991/slides/21-FirmwareSecurity.pdfINTRODUCTION: Embedded systems: -Embedded system

INTRODUCTION:Embeddedsystems:-Embeddedsystemarecomputerswithdedicatedfunc+onalitysuchasrou+ngpacket,prin+ngpagesormakingVOIPphonecallsandetc.-Theyarebroadlyused.-Theyarege:ngcomplexandsmarterandprovingadministra+veornon-administra+veinterfaceinexampletheyimplements-ComplexsoTware-Complexprotocols-Processvarioustypeofdata-Theyarege:ngheavilyinterconnectedinprivateorpublicnetworks(IoT)Firmware:ThesoTwareanddatawhichsupportsthefunc+onalityofembeddedsystemiscalledfirmware.

Page 3: A Large-Scale Analysis of the Security of Embedded Firmwareswebpages.eng.wayne.edu/~fy8421/16fa-csc6991/slides/21-FirmwareSecurity.pdfINTRODUCTION: Embedded systems: -Embedded system

SecurityProblem:Manyexamplesofinsecureembeddedsystemhavebeenseenindailybases:RoutersPrintersVoIPCars...EachoftheabovefindingsisaresultofanindividualanalysisandresearchItincludesmanualandtediouseffortanddoesnotscale.

Page 4: A Large-Scale Analysis of the Security of Embedded Firmwareswebpages.eng.wayne.edu/~fy8421/16fa-csc6991/slides/21-FirmwareSecurity.pdfINTRODUCTION: Embedded systems: -Embedded system

PaperGoal:

Performingalargescaleanalysistoprovideabe;erunderstandingoftheproblem

Page 5: A Large-Scale Analysis of the Security of Embedded Firmwareswebpages.eng.wayne.edu/~fy8421/16fa-csc6991/slides/21-FirmwareSecurity.pdfINTRODUCTION: Embedded systems: -Embedded system

ProblemwithLargeScaleAnalysisinembeddedsystems:Heterogeneityof-Hardware,ArchitectureandOpera+ngSystems-Intendedusers,Requirementsofthedevices-SecurityGoalsforeachfirmwareanddeviceManualAnalysisdoesnotscale,itrequires-FindinganddownloadingFirmwarefiles-Unpackingandperformingini+alorsubsequentanalysis-RediscoveringthesameorsimilarbugsinotherFirmwarefiles

Page 6: A Large-Scale Analysis of the Security of Embedded Firmwareswebpages.eng.wayne.edu/~fy8421/16fa-csc6991/slides/21-FirmwareSecurity.pdfINTRODUCTION: Embedded systems: -Embedded system

PreviousApproaches:

Testofrealdevices[Bojinobv9ccs]-Itisaccurate-Doesnotscaleverywellbecauseitneedsphysicaldevices,logis+candmanagementScanDevicesontheinternetLargescaletesNng[Coi10ACASC]-Canonlytestforknownvulnerability(likedefaultpasswords)-UsingBlackboxapproachSomeresearchistoointrusive[Census2012]-Theyareclosetobeingunethical.-Theyhadtoinjectcodeandcompromisedeviceshencea;ackingdevicesforstudy-

Page 7: A Large-Scale Analysis of the Security of Embedded Firmwareswebpages.eng.wayne.edu/~fy8421/16fa-csc6991/slides/21-FirmwareSecurity.pdfINTRODUCTION: Embedded systems: -Embedded system

Thispaperapproachtothelargescaleanalysis

-Collectalargenumberoffirmwareimages-PerformBroadbutsimplesta+canalysis-CorrelateacrossfirmwaresthefindingsorresultsAdvantages:-Nointrusiveonlinetes+ng-Nodeviceatallintheexperiment-Scaleable(intermsofhardwareresources,compu+ngpower)-Buttherearemanychallenges

Page 8: A Large-Scale Analysis of the Security of Embedded Firmwareswebpages.eng.wayne.edu/~fy8421/16fa-csc6991/slides/21-FirmwareSecurity.pdfINTRODUCTION: Embedded systems: -Embedded system

ChallengeobservaNon:MainstreamSystemshavecentralizedupdateandupdatechannelsandformatsarewellunderstoodandverywellstablished.Suchas-MicrosoTupdate-Appleupdate-LinuxupdatemanagerEmbeddedsystemdoesnothavecentralizedupdatesAfirmwareupdateorfirmwarerecoveryordumpinvolveacombina+onofveryrestrictsprocessincludingbuildingschema+csusingdevelopmentboards,customdriversorcustomu+li+es.-Nolargescalefirmwaredataset

Page 9: A Large-Scale Analysis of the Security of Embedded Firmwareswebpages.eng.wayne.edu/~fy8421/16fa-csc6991/slides/21-FirmwareSecurity.pdfINTRODUCTION: Embedded systems: -Embedded system

ChallengeA:BuildingaRepresentaNveDataset: They collected a subset of firmwares available for download. -This is subset because many firmware and not publicly available -No intended to have an upgrade -Needs product purchase and registration. www.firmware.re project

Page 10: A Large-Scale Analysis of the Security of Embedded Firmwareswebpages.eng.wayne.edu/~fy8421/16fa-csc6991/slides/21-FirmwareSecurity.pdfINTRODUCTION: Embedded systems: -Embedded system

ChallengeB:FirmwareIdenNficaNonInthecollecteddatasettherearesomefilesingrayarea“Uncertain”Goodexampleisprinterupgrade:Upgradebyprin+ngspeciallycraTedPSdocument.Soitseemsnotfirmwarefilebutitisfirmware!Soitbelongstouncertaintyareaandcannotbediscarded.

Page 11: A Large-Scale Analysis of the Security of Embedded Firmwareswebpages.eng.wayne.edu/~fy8421/16fa-csc6991/slides/21-FirmwareSecurity.pdfINTRODUCTION: Embedded systems: -Embedded system

Challenge C: Unpacking and Custom Formats How to reliably unpack and learn format?

OTenafirmwareimageisjustdatabinarybloborasciblob(noheaders)

Page 12: A Large-Scale Analysis of the Security of Embedded Firmwareswebpages.eng.wayne.edu/~fy8421/16fa-csc6991/slides/21-FirmwareSecurity.pdfINTRODUCTION: Embedded systems: -Embedded system

Paperapproachforunpacking&customformatchallengeTheycomparedseveralexisNngunpackingtools(binwalk,FRAK,BAT)TheyusedBAT(BinaryanalysisToolkit)ExtendeditwithmulNplecustomunpackers.BecauseOTenafirmwareimageisjustdatabinarybloborasciblob(noheaders)FileCarvingisrequired(togivemorechanceofextrac+ngsomething)CarvingusesBruteforceateveryoffsetwithallknownunpackersHeuris+cfordetec+ngwheretostopcarvingsinceitresultstohighfalseandnoisydata

Page 13: A Large-Scale Analysis of the Security of Embedded Firmwareswebpages.eng.wayne.edu/~fy8421/16fa-csc6991/slides/21-FirmwareSecurity.pdfINTRODUCTION: Embedded systems: -Embedded system

ChallengeD:ScalabilityandComputaNonalLimits:-UnpackingandfilecarvingisveryCPUintensive-Unpackingresultsinmillionsoffilessomanualanalysisifinfeasible-One-to-OnefuzzyhashcomparisononbigdatasetisCPUintensive

Page 14: A Large-Scale Analysis of the Security of Embedded Firmwareswebpages.eng.wayne.edu/~fy8421/16fa-csc6991/slides/21-FirmwareSecurity.pdfINTRODUCTION: Embedded systems: -Embedded system

ChallengeE:ResultsConfirmaNon•  Annissuewhichisfoundsta+cally-Maynotapplytoarealdevice-CannotguaranteeexploitabilityInexamplevulnerabledaemonpresentbutneverstarted•  Issueconfirma+onisdifficultproblem-Requiredadvancedanalysis(sta+c&dynamic)-OTenrequiredrealembeddeddevicesforfinalconfirma+on-Doesnotscalewellinheterogeneousenvironment(involvingmanydevicesand)

Page 15: A Large-Scale Analysis of the Security of Embedded Firmwareswebpages.eng.wayne.edu/~fy8421/16fa-csc6991/slides/21-FirmwareSecurity.pdfINTRODUCTION: Embedded systems: -Embedded system

Architecture:

Page 16: A Large-Scale Analysis of the Security of Embedded Firmwareswebpages.eng.wayne.edu/~fy8421/16fa-csc6991/slides/21-FirmwareSecurity.pdfINTRODUCTION: Embedded systems: -Embedded system

Crawler:759kcollectedfiles.1.8TBofdiskspaceUsesFTP-indexEnginesandGCSE(Googlecustomsearchengine)APIUnpacking:

Page 17: A Large-Scale Analysis of the Security of Embedded Firmwareswebpages.eng.wayne.edu/~fy8421/16fa-csc6991/slides/21-FirmwareSecurity.pdfINTRODUCTION: Embedded systems: -Embedded system

StaNcanalysis:• 

CorrelaNon/clustering:basedonfuzzyhashes,PrivateSSLkeys,Creden+als

•  WebServerConfigs,hardcodedcreden+al,CodeRepositories•  DataEnrichment:VersionBannersSpecificKeywords(e.gTelnet,Shell,UART,backdoor)

Page 18: A Large-Scale Analysis of the Security of Embedded Firmwareswebpages.eng.wayne.edu/~fy8421/16fa-csc6991/slides/21-FirmwareSecurity.pdfINTRODUCTION: Embedded systems: -Embedded system

ExampleofCorrelaNon:correlaNonviafussyhashessimilariNes(ssdeep,sdhash)StrongCorrela+onbetweentwofirmwarebyhavingSharedCreden+alsandSelf-SignedCer+ficatesE.GvulnerabilitypropagaNon.

Page 19: A Large-Scale Analysis of the Security of Embedded Firmwareswebpages.eng.wayne.edu/~fy8421/16fa-csc6991/slides/21-FirmwareSecurity.pdfINTRODUCTION: Embedded systems: -Embedded system

CaseStudies:1-BackdoorsinPlainSightthebackdoorwasfoundtobeac+vatedbythestring“xmlsetroodkcableoj28840yb+de”(i.e.,editby04882joelbackdoorinreverse).theyperformedastringsearchinthedatasetwithvariousbackdoorrelatedkeywordsandfound1198matches,in326firmwarecandidates.2-PrivateSSL(RSAkey)•  manyfirmwareimagescontainingpublicandprivateRSA

keypairs•  -plarormautoma+callyextractsthefingerprintofthepublic

keys,privatekeysandSSLcer+ficates.•  -keysarethensearchedinZMap’sHTTPSsurveyDatabase•  VendorC’sSSLcer+ficatewasfoundtobeusedbyaround

30KonlineIPaddresses.•  -thenfetchedthewebpagesavailableatthoseaddresses(withouttryingtoauthen+cate).Surprisingly,ReturnedCCTVcamerasbrandedbyanothervendor–VendorB

Page 20: A Large-Scale Analysis of the Security of Embedded Firmwareswebpages.eng.wayne.edu/~fy8421/16fa-csc6991/slides/21-FirmwareSecurity.pdfINTRODUCTION: Embedded systems: -Embedded system

ResultSummary:•  38newvulnerabili+es(CVE)•  Correlatedthemto140konlinedevices.•  Affected693firmwarefilesbyatleastoneofthese

vulnerabili+es.

Page 21: A Large-Scale Analysis of the Security of Embedded Firmwareswebpages.eng.wayne.edu/~fy8421/16fa-csc6991/slides/21-FirmwareSecurity.pdfINTRODUCTION: Embedded systems: -Embedded system

Conclusion:Abroaderviewoffirmwares•  Notonlybeneficialbutnecessaryfordiscoveryandanalysis•  Correla+onrevealsfirmwarerela+onshipShowhowvulnerabilityreappearindifferentproductorvendor•  Couldallowhowfirmwareareevolveorgetfixed•  Therearemanyhiddenvulnerability•  Securityisatradeoffwithcostand+metomarketandSecurityisnotpriorityofsomevendors

Page 22: A Large-Scale Analysis of the Security of Embedded Firmwareswebpages.eng.wayne.edu/~fy8421/16fa-csc6991/slides/21-FirmwareSecurity.pdfINTRODUCTION: Embedded systems: -Embedded system

REFERENCE:

•  h;ps://www.usenix.org/node/184450