Inception: System-wide security testing of real-world embedded systems software

Corteggiani, Nassim; Camurati, Giovanni; Francillon, Aurélien
USENIX 2018, 27th Usenix Security Symposium, August 15-17, 2018, Baltimore, MD, USA

Connected embedded systems are becoming widely deployed, and their security is a serious concern. Current techniques for security testing of embedded software rely either on source code or on binaries. Detecting vulnerabilities by testing binary code is harder, because source code semantics are lost. Unfortunately, in embedded systems, high-level source code (C/C++) is often mixed with hand-written assembly, which cannot be directly handled by current source-based tools. In this paper we introduce Inception, a framework to perform security testing of complete real-world embedded firmware. Inception introduces novel techniques for symbolic execution in embedded systems. In particular, Inception Translator generates and merges LLVM bitcode from high-level source code, hand-written assembly, binary libraries, and part of the processor hardware behavior. This design reduces differences with real execution as well as the manual effort. The source code semantics are preserved, improving the effectiveness of security checks. Inception Symbolic Virtual Machine, based on KLEE, performs symbolic execution, using several strategies to handle different levels of memory abstractions, interaction with peripherals, and interrupts. Finally, the Inception Debugger is a high-performance JTAG debugger which performs redirection of memory accesses to the real hardware. We first validate our implementation using 53000 tests comparing Inception's execution to concrete execution on an Arm Cortex-M3 chip. We then show Inception's advantages on a benchmark made of 1624 synthetic vulnerable programs, four real-world open source and industrial applications, and 19 demos. We discovered eight crashes and two previously unknown vulnerabilities, demonstrating the effectiveness of Inception as a tool to assist embedded device firmware testing.


Type:
Conference
City:
Baltimore
Date:
2018-08-15
Department:
Digital Security
Eurecom Ref:
5550
Copyright:
Copyright Usenix. Personal use of this material is permitted. The definitive version of this paper was published in USENIX 2018, 27th Usenix Security Symposium, August 15-17, 2018, Baltimore, MD, USA and is available at :

PERMALINK : https://www.eurecom.fr/publication/5550