Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management Interface
A novel approach for discovering vulnerability in commercial off-the-shelf (COTS) IoT devices is proposed in this paper, which will revolutionize the area. Unlike previous work, the web management interface in IoT was used to detect vulnerabilities by leveraging fuzzing technology. To validate and e...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2019-01-01
|
Series: | Security and Communication Networks |
Online Access: | http://dx.doi.org/10.1155/2019/5076324 |
id |
doaj-2ae9c65c64b8461d8f8317ead5d8f163 |
---|---|
record_format |
Article |
spelling |
doaj-2ae9c65c64b8461d8f8317ead5d8f1632020-11-25T02:11:56ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222019-01-01201910.1155/2019/50763245076324Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management InterfaceDong Wang0Xiaosong Zhang1Ting Chen2Jingwei Li3University of Electronic Science and Technology of China, ADLab of Venustech, Chengdu, ChinaUniversity of Electronic Science and Technology of China, Chengdu, ChinaUniversity of Electronic Science and Technology of China, Chengdu, ChinaUniversity of Electronic Science and Technology of China, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Chengdu, ChinaA novel approach for discovering vulnerability in commercial off-the-shelf (COTS) IoT devices is proposed in this paper, which will revolutionize the area. Unlike previous work, the web management interface in IoT was used to detect vulnerabilities by leveraging fuzzing technology. To validate and evaluate this scheme, a tool named WMIFuzzer was designed and implemented. There were also two challenges: (1) due to the diversity of web interface implementations, there were no existing seed messages for fuzzing this interface and it was inefficient while taking random messages to launch the fuzzing and (2) because of the highly structured seed message, fuzzing with byte-level mutation could conduce to be rejected by the device at an early stage. To address these challenges, a brute-force UI automation was designed to drive the web interface to generate initial seed messages automatically, as well as a weighted message parse tree (WMPT) was proposed to guide the mutation to generate mostly structure-valid messages. The extensive experimental results show that WMIFuzzer could achieve expected result while 10 vulnerabilities including 6 zero-days in 7 COTS IoT devices were discovered.http://dx.doi.org/10.1155/2019/5076324 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Dong Wang Xiaosong Zhang Ting Chen Jingwei Li |
spellingShingle |
Dong Wang Xiaosong Zhang Ting Chen Jingwei Li Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management Interface Security and Communication Networks |
author_facet |
Dong Wang Xiaosong Zhang Ting Chen Jingwei Li |
author_sort |
Dong Wang |
title |
Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management Interface |
title_short |
Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management Interface |
title_full |
Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management Interface |
title_fullStr |
Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management Interface |
title_full_unstemmed |
Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management Interface |
title_sort |
discovering vulnerabilities in cots iot devices through blackbox fuzzing web management interface |
publisher |
Hindawi-Wiley |
series |
Security and Communication Networks |
issn |
1939-0114 1939-0122 |
publishDate |
2019-01-01 |
description |
A novel approach for discovering vulnerability in commercial off-the-shelf (COTS) IoT devices is proposed in this paper, which will revolutionize the area. Unlike previous work, the web management interface in IoT was used to detect vulnerabilities by leveraging fuzzing technology. To validate and evaluate this scheme, a tool named WMIFuzzer was designed and implemented. There were also two challenges: (1) due to the diversity of web interface implementations, there were no existing seed messages for fuzzing this interface and it was inefficient while taking random messages to launch the fuzzing and (2) because of the highly structured seed message, fuzzing with byte-level mutation could conduce to be rejected by the device at an early stage. To address these challenges, a brute-force UI automation was designed to drive the web interface to generate initial seed messages automatically, as well as a weighted message parse tree (WMPT) was proposed to guide the mutation to generate mostly structure-valid messages. The extensive experimental results show that WMIFuzzer could achieve expected result while 10 vulnerabilities including 6 zero-days in 7 COTS IoT devices were discovered. |
url |
http://dx.doi.org/10.1155/2019/5076324 |
work_keys_str_mv |
AT dongwang discoveringvulnerabilitiesincotsiotdevicesthroughblackboxfuzzingwebmanagementinterface AT xiaosongzhang discoveringvulnerabilitiesincotsiotdevicesthroughblackboxfuzzingwebmanagementinterface AT tingchen discoveringvulnerabilitiesincotsiotdevicesthroughblackboxfuzzingwebmanagementinterface AT jingweili discoveringvulnerabilitiesincotsiotdevicesthroughblackboxfuzzingwebmanagementinterface |
_version_ |
1724911767737335808 |