Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management Interface

A novel approach for discovering vulnerability in commercial off-the-shelf (COTS) IoT devices is proposed in this paper, which will revolutionize the area. Unlike previous work, the web management interface in IoT was used to detect vulnerabilities by leveraging fuzzing technology. To validate and e...

Full description

Bibliographic Details
Main Authors: Dong Wang, Xiaosong Zhang, Ting Chen, Jingwei Li
Format: Article
Language:English
Published: Hindawi-Wiley 2019-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2019/5076324
id doaj-2ae9c65c64b8461d8f8317ead5d8f163
record_format Article
spelling doaj-2ae9c65c64b8461d8f8317ead5d8f1632020-11-25T02:11:56ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222019-01-01201910.1155/2019/50763245076324Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management InterfaceDong Wang0Xiaosong Zhang1Ting Chen2Jingwei Li3University of Electronic Science and Technology of China, ADLab of Venustech, Chengdu, ChinaUniversity of Electronic Science and Technology of China, Chengdu, ChinaUniversity of Electronic Science and Technology of China, Chengdu, ChinaUniversity of Electronic Science and Technology of China, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Chengdu, ChinaA novel approach for discovering vulnerability in commercial off-the-shelf (COTS) IoT devices is proposed in this paper, which will revolutionize the area. Unlike previous work, the web management interface in IoT was used to detect vulnerabilities by leveraging fuzzing technology. To validate and evaluate this scheme, a tool named WMIFuzzer was designed and implemented. There were also two challenges: (1) due to the diversity of web interface implementations, there were no existing seed messages for fuzzing this interface and it was inefficient while taking random messages to launch the fuzzing and (2) because of the highly structured seed message, fuzzing with byte-level mutation could conduce to be rejected by the device at an early stage. To address these challenges, a brute-force UI automation was designed to drive the web interface to generate initial seed messages automatically, as well as a weighted message parse tree (WMPT) was proposed to guide the mutation to generate mostly structure-valid messages. The extensive experimental results show that WMIFuzzer could achieve expected result while 10 vulnerabilities including 6 zero-days in 7 COTS IoT devices were discovered.http://dx.doi.org/10.1155/2019/5076324
collection DOAJ
language English
format Article
sources DOAJ
author Dong Wang
Xiaosong Zhang
Ting Chen
Jingwei Li
spellingShingle Dong Wang
Xiaosong Zhang
Ting Chen
Jingwei Li
Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management Interface
Security and Communication Networks
author_facet Dong Wang
Xiaosong Zhang
Ting Chen
Jingwei Li
author_sort Dong Wang
title Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management Interface
title_short Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management Interface
title_full Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management Interface
title_fullStr Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management Interface
title_full_unstemmed Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management Interface
title_sort discovering vulnerabilities in cots iot devices through blackbox fuzzing web management interface
publisher Hindawi-Wiley
series Security and Communication Networks
issn 1939-0114
1939-0122
publishDate 2019-01-01
description A novel approach for discovering vulnerability in commercial off-the-shelf (COTS) IoT devices is proposed in this paper, which will revolutionize the area. Unlike previous work, the web management interface in IoT was used to detect vulnerabilities by leveraging fuzzing technology. To validate and evaluate this scheme, a tool named WMIFuzzer was designed and implemented. There were also two challenges: (1) due to the diversity of web interface implementations, there were no existing seed messages for fuzzing this interface and it was inefficient while taking random messages to launch the fuzzing and (2) because of the highly structured seed message, fuzzing with byte-level mutation could conduce to be rejected by the device at an early stage. To address these challenges, a brute-force UI automation was designed to drive the web interface to generate initial seed messages automatically, as well as a weighted message parse tree (WMPT) was proposed to guide the mutation to generate mostly structure-valid messages. The extensive experimental results show that WMIFuzzer could achieve expected result while 10 vulnerabilities including 6 zero-days in 7 COTS IoT devices were discovered.
url http://dx.doi.org/10.1155/2019/5076324
work_keys_str_mv AT dongwang discoveringvulnerabilitiesincotsiotdevicesthroughblackboxfuzzingwebmanagementinterface
AT xiaosongzhang discoveringvulnerabilitiesincotsiotdevicesthroughblackboxfuzzingwebmanagementinterface
AT tingchen discoveringvulnerabilitiesincotsiotdevicesthroughblackboxfuzzingwebmanagementinterface
AT jingweili discoveringvulnerabilitiesincotsiotdevicesthroughblackboxfuzzingwebmanagementinterface
_version_ 1724911767737335808