Login | Register

Fingerprinting Vulnerabilities in Intelligent Electronic Device Firmware

Title:

Fingerprinting Vulnerabilities in Intelligent Electronic Device Firmware

Collard, L (2018) Fingerprinting Vulnerabilities in Intelligent Electronic Device Firmware. Masters thesis, Concordia University.

[thumbnail of Collard_MASc_S2019.pdf]
Text (application/pdf)
Collard_MASc_S2019.pdf - Accepted Version
Available under License Spectrum Terms of Access.
4MB

Abstract

Modern smart grid deployments heavily rely on the advanced capabilities that Intelligent Electronic Devices (IEDs) provide. Furthermore, these devices firmware often contain critical vulnerabilities that if exploited could cause large impacts on national economic security, and national safety. As such, a scalable domain specific approach is required in order to assess the security of IED firmware. In order to resolve this lack of an appropriate methodology, we present a scalable vulnerable function identification framework. It is specifically designed to analyze IED firmware and binaries that employ the ARM CPU architecture. Its core functionality revolves around a multi-stage detection methodology that is specifically designed to resolve the lack of specialization that limits other general-purpose approaches. This is achieved by compiling an extensive database of IED specific vulnerabilities and domain specific firmware that is evaluated. Its analysis approach is composed of three stages that leverage function syntactic, semantic, structural and statistical features in order to identify vulnerabilities. As such it (i) first filters out dissimilar functions based on a group of heterogeneous features, (ii) it then further filters out dissimilar functions based on their execution paths, and (iii) it finally identifies candidate functions based on fuzzy graph matching . In order to validate our methodologies capabilities, it is implemented as a binary analysis framework entitled BinArm. The resulting algorithm is then put through a rigorous set of evaluations that demonstrate its capabilities. These include the capability to identify vulnerabilities within a given IED firmware image with a total accuracy of 0.92.

Divisions:Concordia University > Gina Cody School of Engineering and Computer Science
Item Type:Thesis (Masters)
Authors:Collard, L
Institution:Concordia University
Degree Name:M.A. Sc.
Program:Information Systems Security
Date:17 December 2018
Thesis Supervisor(s):Debbabi, Mourad and Hanna, Aiman
ID Code:984793
Deposited By: LEO COLLARD
Deposited On:08 Jul 2019 12:45
Last Modified:08 Jul 2019 12:45
All items in Spectrum are protected by copyright, with all rights reserved. The use of items is governed by Spectrum's terms of access.

Repository Staff Only: item control page

Downloads per month over past year

Research related to the current document (at the CORE website)
- Research related to the current document (at the CORE website)
Back to top Back to top