Hard-coded backdoor detection method based on semantic conflict

The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of...

Full description

Bibliographic Details
Main Author: Anxiang HU, Da XIAO, Shichen GUO, Shengli LIU
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2023-02-01
Series:网络与信息安全学报
Subjects:
Online Access:https://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2023015
_version_ 1797262585311002624
author Anxiang HU, Da XIAO, Shichen GUO, Shengli LIU
author_facet Anxiang HU, Da XIAO, Shichen GUO, Shengli LIU
author_sort Anxiang HU, Da XIAO, Shichen GUO, Shengli LIU
collection DOAJ
description The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.
first_indexed 2024-04-24T23:59:27Z
format Article
id doaj.art-8c4c1728436f4b6f811015b395bf009f
institution Directory Open Access Journal
issn 2096-109X
language English
last_indexed 2024-04-24T23:59:27Z
publishDate 2023-02-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj.art-8c4c1728436f4b6f811015b395bf009f2024-03-14T08:33:13ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2023-02-019115015710.11959/j.issn.2096-109x.2023015Hard-coded backdoor detection method based on semantic conflictAnxiang HU, Da XIAO, Shichen GUO, Shengli LIUThe current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.https://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2023015router firmwarehard-coded backdoorstring comparison functionssemantic conflict
spellingShingle Anxiang HU, Da XIAO, Shichen GUO, Shengli LIU
Hard-coded backdoor detection method based on semantic conflict
网络与信息安全学报
router firmware
hard-coded backdoor
string comparison functions
semantic conflict
title Hard-coded backdoor detection method based on semantic conflict
title_full Hard-coded backdoor detection method based on semantic conflict
title_fullStr Hard-coded backdoor detection method based on semantic conflict
title_full_unstemmed Hard-coded backdoor detection method based on semantic conflict
title_short Hard-coded backdoor detection method based on semantic conflict
title_sort hard coded backdoor detection method based on semantic conflict
topic router firmware
hard-coded backdoor
string comparison functions
semantic conflict
url https://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2023015
work_keys_str_mv AT anxianghudaxiaoshichenguoshengliliu hardcodedbackdoordetectionmethodbasedonsemanticconflict