KEYWORDS: Binary data, Device simulation, Information security, Internet of things, Mining, Raster graphics, Instrument modeling, Detection and tracking algorithms, Data modeling, Target detection
With the development of 5G technology, Internet of thing (IoT) devices are widely used and the exposed number in the network is growing. IoT devices bring many security issues and mature security analysis techniques cannot be applied because of its poor performance and diverse architecture, which makes vulnerability mining less efficient for IoT devices.
This paper proposes a taint analysis instrumentation based firmware fuzzing system (TAIFuzz) to solve vulnerability exploration problem of firmware binary programs for IoT devices. The work mainly includes: 1) proposing a dynamic instrumentation method for firmware binary programs based on remote cross-debugging, running the firmware program through QEMU on an x86 host, making the program independent of real device, and using mature x86 architecture analysis tools to perform binary instrumentation on the emulated firmware through remote cross-debugging technology. 2) proposing a taint analysis method based on dynamic binary instrumentation, which only instruments the simulation execution results through taint analysis-related information, further reducing the impact of instrumentation points on vulnerability exploration efficiency. The feedback information from the instrumentation can be transferred to the test case generation work, making the test set able to reach dangerous paths that can be exposed to external input data. 3) proposing a feedback-based fuzzing case mutation algorithm based on model constraints with the taint information obtained from binary dynamic instrumentation technology and the constraints of model constraint files and selecting an appropriate test case mutation algorithm to process test cases. Guiding the seed mutation process of fuzzing, generated test cases are more effective, thereby improving the coverage of main dangerous paths in fuzzing.
Through experimental comparisons, TAIFuzz proposed can complete vulnerability exploration in a shorter time than the commonly used protocol fuzzing tools Boofuzz and Peach, thereby improving the efficiency of fuzzing for IoT devices.
Aiming at the problems of single monitoring and management mode, poor real-time performance, low transparency, and difficulty in operation and maintenance of the current data room, a digital twin machine room dynamic environment monitoring system based on the Drools inference engine was constructed. In the virtual scene, the Drools rule engine is used to build an expert system for fault analysis and prediction in the data room, which improves the interactivity of the dynamic loop system in the data room, greatly improves the accuracy and timeliness of fault diagnosis, and has great application value.
With the acceleration of the digital construction of the power grid, many important data is collected in data centers. If a fault is not found in time, it may cause serious information security incidents. In terms of the above problems, a digital twin modeling of data center computer room (DC computer room) based on long short-term memory (LSTM) network is proposed in this paper to monitor and early warn the failures of important equipment in computer rooms. The model adopts a five-layer architecture of the equipment layer, data interaction layer, model construction layer, simulation analysis layer, and application layer. Meanwhile, the evaluation characteristics of the equipment in the data center room are constructed, and the time sequence parameters of the equipment are predicted in real time based on the long-term and short-term memory network, and the equipment that may fail is warned in advance to assist the maintenance personnel in equipment maintenance.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.