IoT 기기 취약점 분석을 위한 펌웨어 추출 및 분석 환경 구축 방법론

Vol. 34, No. 6, pp. 1359-1368, 12월. 2024
10.13089/JKIISC.2024.34.6.1359, Full Text:
Keywords: IoT security, Cyber Physical System, firmware, Embedded, vulnerability Analysis
Abstract

In recent years, the rapid development of IoT technology has led to the creation of various IoT devices, offering users a wide range of functionalities and conveniences. However, alongside this advancement, concerns about security threats such as personal information leakage have also grown. Therefore, detecting security vulnerabilities in IoT devices in advance is of utmost importance, and various vulnerability analysis studies are being conducted to address these concerns. However, the process of acquiring firmware and establishing an analysis environment for IoT device vulnerability analysis is not easily standardized, making it challenging for many researchers. In this paper, we propose a universal methodology for extracting firmware and establishing an analysis environment for SOP-type chips embedded in small IoT devices, such as IP cameras, which are widely used by consumers. Furthermore, through the application of the proposed methodology to commercial IoT devices and the process of building an analysis environment for real devices, we aim to provide IoT security researchers with a guideline for firmware extraction and analysis environment setup.

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
이예준, 조효진, 이승민, "Firmware Extraction and Analysis Environment Construction Methodology for IoT Devices Vulnerabilities Analysis," Journal of The Korea Institute of Information Security and Cryptology, vol. 34, no. 6, pp. 1359-1368, 2024. DOI: 10.13089/JKIISC.2024.34.6.1359.

[ACM Style]
이예준, 조효진, and 이승민. 2024. Firmware Extraction and Analysis Environment Construction Methodology for IoT Devices Vulnerabilities Analysis. Journal of The Korea Institute of Information Security and Cryptology, 34, 6, (2024), 1359-1368. DOI: 10.13089/JKIISC.2024.34.6.1359.