A large scale analysis of the security of embedded firmwares

Costin, Andrei; Zaddach, Jonas; Francillon, Aurélien; Balzarotti, Davide
USENIX Security 2014, 23rd USENIX Security Symposium, August 20-22, 2014, San Diego, USA

As embedded systems are more than ever present in our society, their security is becoming an increasingly important issue. However, based on the results of many recent analyses of individual firmware images, embedded systems acquired a reputation of being insecure. Despite these facts, we still lack a global understanding of embedded systems' security as well as the tools and techniques needed to support such general claims. In this paper we present the first public, large-scale analysis of firmware images. In particular, we unpacked 32 thousand firmware images into 1.7 million individual files, which we then statically analyzed. We leverage this large-scale analysis to bring new insights on the security of embedded devices and to underline and detail several important challenges that need to be addressed in future research. We also show the main benefits of looking at many different devices at the same time and of linking our results with other large-scale datasets such as the ZMap's HTTPS survey. In summary, without performing sophisticated static analysis, we discovered a total of 38 previously unknown vulnerabilities in over 693 firmware images. Moreover, by correlating similar files inside apparently unrelated firmware images, we were able to extend some of those vulnerabilities to over 123 different products. We also confirmed that some of these vulnerabilities altogether are affecting at least 140K devices accessible over the Internet. It would not have been possible to achieve these results without an analysis at such wide scale. We believe that this project, which we plan to provide as a firmware unpacking and analysis web service1 , will help shed some light on the security of embedded devices.                     

San Diego
Digital Security
Eurecom Ref:
Copyright Usenix. Personal use of this material is permitted. The definitive version of this paper was published in USENIX Security 2014, 23rd USENIX Security Symposium, August 20-22, 2014, San Diego, USA and is available at :

PERMALINK : https://www.eurecom.fr/publication/4323