Determining the Image Base of Smart Device Firmware for Security Analysis

Ruijin Zhu, Baofeng Zhang, Yu An Tan, Jinmiao Wang*, Yueliang Wan

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

3 Citations (Scopus)

Abstract

The authorization mechanism of smart devices is mainly implemented by firmware, yet many smart devices have security issues about their firmware. Limited research has focused on securing the firmware of smart devices, although increasingly more smart devices are used to deal with the very sensitive applications, activities, and data of users. Thus, research on smart device firmware security is of growing importance. Disassembly is a common method for evaluating the security of authorization mechanisms. When disassembling firmware, the processor type of the running environment and the image base of the firmware should first be determined. In general, the processor type can be obtained by tearing down the device or consulting the product manual. However, it is not easy to determine the image base of firmware. Since the processors of many smart devices are ARM architectures, in this paper, we focus on firmware under the ARM architecture and propose an automated method for determining the image base. By studying the storage law of the jump table in the firmware of ARM-based smart devices, we propose an algorithm, named determining the image base by searching jump tables (DBJT), to determine the image base. The experimental results indicate that the proposed method can successfully determine the image base of firmware, which stores the absolute address in the jump table.

Original languageEnglish
Article number8899193
JournalWireless Communications and Mobile Computing
Volume2020
DOIs
Publication statusPublished - 2020

Fingerprint

Dive into the research topics of 'Determining the Image Base of Smart Device Firmware for Security Analysis'. Together they form a unique fingerprint.

Cite this