Please use this identifier to cite or link to this item: https://hdl.handle.net/2440/135814
Citations
Scopus Web of Science® Altmetric
?
?
Type: Conference paper
Title: Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference
Author: Feng, X.
Sun, R.
Zhu, X.
Xue, M.
Wen, S.
Liu, D.
Nepal, S.
Xiang, Y.
Citation: Proceedings of the ACM Conference on Computer and Communications Security, 2021, pp.337-350
Publisher: Association for Computing Machinery
Issue Date: 2021
ISBN: 9781450384544
ISSN: 1543-7221
Conference Name: ACM SIGSAC Conference on Computer and Communications Security (CCS) (15 Nov 2021 - 19 Nov 2021 : Virtual Online)
Statement of
Responsibility: 
Xiaotao Feng, Ruoxi Sun, Xiaogang Zhu, Minhui Xue, Sheng Wen, Dongxi Liu, Surya Nepal, Yang Xiang
Abstract: The proliferation of Internet of Things (IoT) devices has made people’s lives more convenient, but it has also raised many security concerns. Due to the difficulty of obtaining and emulating IoT firmware, in the absence of internal execution information, blackbox fuzzing of IoT devices has become a viable option. However, existing black-box fuzzers cannot form effective mutation optimization mechanisms to guide their testing processes, mainly due to the lack of feedback. In addition, because of the prevalent use of various and non-standard communication message formats in IoT devices, it is difficult or even impossible to apply existing grammar-based fuzzing strategies. Therefore, an efficient fuzzing approach with syntax inference is required in the IoT fuzzing domain. To address these critical problems, we propose a novel automatic black-box fuzzing for IoT firmware, termed Snipuzz. Snipuzz runs as a client communicating with the devices and infers message snippets for mutation based on the responses. Each snippet refers to a block of consecutive bytes that reflect the approximate code coverage in fuzzing. This mutation strategy based on message snippets considerably narrows down the search space to change the probing messages. We compared Snipuzz with four state-of-theart IoT fuzzing approaches, i.e., IoTFuzzer, BooFuzz, Doona, and Nemesys. Snipuzz not only inherits the advantages of app-based fuzzing (e.g., IoTFuzzer), but also utilizes communication responses to perform efficient mutation. Furthermore, Snipuzz is lightweight as its execution does not rely on any prerequisite operations, such as reverse engineering of apps. We also evaluated Snipuzz on 20 popular real-world IoT devices. Our results show that Snipuzz could identify 5 zero-day vulnerabilities, and 3 of them could be exposed only by Snipuzz. All the newly discovered vulnerabilities have been confirmed by their vendors.
Keywords: Fuzzing; IoT firmware; mutation; vulnerabilities
Rights: © 2021 Association for Computing Machinery. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org.
DOI: 10.1145/3460120.3484543
Grant ID: http://purl.org/au-research/grants/arc/DP210102670
http://purl.org/au-research/grants/arc/DP200100886
http://purl.org/au-research/grants/arc/LP180100170
Published version: https://dl.acm.org/doi/proceedings/10.1145/3460120
Appears in Collections:Computer Science publications

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.