#249 Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in User-Space Emulation


More

  • Adam Oest
  • Andrea Continella
  • Daniel Alexander Zappala
  • Daniel Votipka
  • Davide Balzarotti
  • Frederico Araujo
  • Gianluca Stringhini
  • Kurt Thomas
  • Manuel Egele
  • Sara Rampazzi
  • Shirin Nilizadeh
  • Thorsten Holz
  • Xiapu Luo
  • Yanick Fratantonio

R2 Accept Conditional on Major Revision -> Accept

[PDF] Final version (536kB) Jun 14, 2023, 12:12:17 PM PDT · e688675a01bae05a03fa9b502c3e91c7d8ca85dff64cc241b94414d25f9fd194e688675a

[PDF] Submission version

As IoT devices grow more widespread, scaling current analysis techniques to match becomes an increasingly critical task. Part of this challenge involves not only rehosting the firmware of these embedded devices in an emulated environment, but to do so and discover real vulnerabilities. Current state-of-the-art approaches for rehosting must account for the discrepancies between emulated and physical devices, and thus generally focus on improving \emph{the emulation fidelity}. However, this pursuit of fidelity ignores other potential solutions. In this paper, we propose a novel rehosting technique, \emph{user-space single-service rehosting}, which emulates a single firmware service in user space. We study the rehosting process involved in hundreds of firmware samples to generalize a set of \emph{roadblocks} that prevent emulation and create \emph{interventions} to resolve them. Our prototype Greenhouse automatically rehosts 2,841 (39.7\%) of our collected 7,140 firmware images from nine different vendors. Our approach sidesteps many of the challenges encountered by previous rehosting techniques and enables us to apply common vulnerability discovery techniques to our rehosted images such as user-space coverage-guided fuzzing. Using these techniques, we find 717 N-day vulnerabilities and 26 zero-day vulnerabilities on a subset of our rehosted firmware services.

H. Tay, K. Zeng, J. Vadayath, A. Raj, A. Dutcher, T. Reddy, W. Gibbs, Z. Basque, F. Dong, Z. Smith, A. Doupé, T. Bao, Y. Shoshitaishvili, R. Wang
Ethics Consideration
Internet Defense Prize
Distinguished Paper Award
Artifact Evaluation

  • Hardware security: Embedded systems security
  • Security analysis: Automated security analysis of source code and binaries

To edit this submission, sign in using your email and password.