Skip to main content

Association Analysis of Firmware Based on NoSQL Database

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11067))

Included in the following conference series:

  • 2129 Accesses

Abstract

With the continuous expanding of the Internet of Things, the security of networked embedded devices attracts much attention. Large scale embedded device firmware provides basic data for automated and artificial intelligent analysis method. Thus, an association analysis method for the large scale firmware security is proposed in this paper. Then, a firmware database platform based on the proposed analysis method is developed. First, the platform can complete the mainline of embedded device firmware crawl with its web crawler program. Then, a firmware NoSQL database including the firmware and its information (such as its vendor, product, version, URL, files, etc.) is formed. Last, the firmware analysis method is applied on the database by matching the hashes of the web files and programs in the firmware file system with vulnerability file. The experimental result shows that the proposed method is effective and efficient.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bellard, F.: QEMU, a fast and portable dynamic translator. In: USENIX Annual Technical Conference, FREENIX Track, vol. 41, p. 46 (2005)

    Google Scholar 

  2. Chen, D., Woo, M., Brumley, D., Egele, M.: Towards automated dynamic analysis for Linux-based embedded firmware. In: Network and Distributed System Security Symposium (2016)

    Google Scholar 

  3. Zaddach, J., Bruno, L., Francillon, A., Balzarotti, D.: Avatar: a framework to support dynamic security analysis of embedded systems’ firmwares. In: Network and Distributed System Security Symposium (2015)

    Google Scholar 

  4. Costin, A., Zarras, A., Francillon, A.: Towards automated classification of firmware images and identification of embedded devices. In: De Capitani di Vimercati, S., Martinelli, F. (eds.) SEC 2017. IAICT, vol. 502, pp. 233–247. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-58469-0_16

    Chapter  Google Scholar 

  5. Feng, Q., Zhou, R., Xu C., Cheng, Y., Testa, B., Yin, H.: Scalable graph-based bug search for firmware images. In: ACM SIGSAC Conference on Computer and Communications Security, pp. 480–491. ACM (2016)

    Google Scholar 

  6. Xu, X., Liu, C., Feng, Q., Yin, H., Song, L., Song, D.: Neural network-based graph embedding for cross-platform binary code similarity detection. In: CCS 2017 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 363–376. ACM, New York (2017)

    Google Scholar 

  7. Chodorow, K., Dirolf, M.: MongoDB: the definitive guide: powerful and scalable data storage. DBLP (2010)

    Google Scholar 

  8. Scrapy: A fast and powerful scraping and web crawling framework, 31 November 2016. http://scrapy.org

  9. Zhu, X., Yin, Q., Chang, R.: Structured feature library-based progressive firmware format parsing. J. Wuhan Univ. (2017)

    Google Scholar 

  10. Zhou, Z., Xue, Y., Liu, J., Zhang, W., Li, J.: MDH: a high speed multi-phase dynamic hash string matching algorithm for large-scale pattern set. In: Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. LNCS, vol. 4861, pp. 201–215. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-77048-0_16

    Chapter  Google Scholar 

  11. Hoglund, G.: Fuzzy hash algorithm. US, US 8484152 B2 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gongbo Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, G., Dong, W., Chang, R. (2018). Association Analysis of Firmware Based on NoSQL Database. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11067. Springer, Cham. https://doi.org/10.1007/978-3-030-00018-9_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00018-9_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00017-2

  • Online ISBN: 978-3-030-00018-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics