Главная
Study mode:
on
1
Introduction
2
Overview of IoT
3
Why is it hard to secure IoT
4
Firmware design
5
Interprocess communication
6
Environment variable
7
Unpacking
8
CPS
9
BDG
10
Static Link
11
Results
12
Running current
13
Summary
Description:
Explore the intricacies of identifying multi-binary vulnerabilities in embedded firmware at scale in this 37-minute conference talk from the 36th Chaos Communication Congress. Delve into the challenges of analyzing hardware-dependent software on low-power, single-purpose embedded devices like routers and IoT systems. Learn about Karonte, a novel static analysis tool that models and tracks multi-binary interactions to detect insecure, attacker-controlled vulnerabilities. Discover the results of experiments on 53 firmware samples from various vendors, leading to the discovery of 46 zero-day bugs. Gain insights from a large-scale experiment on 899 different samples, demonstrating Karonte's scalability and effectiveness in analyzing real-world firmware. Watch a demonstration of the tool in action, showcasing its ability to detect previously unknown vulnerabilities.

Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale

media.ccc.de
Add to list
0:00 / 0:00