TY - JOUR
T1 - Determining the Image Base of Smart Device Firmware for Security Analysis
AU - Zhu, Ruijin
AU - Zhang, Baofeng
AU - Tan, Yu An
AU - Wang, Jinmiao
AU - Wan, Yueliang
N1 - Publisher Copyright:
© 2020 Ruijin Zhu et al.
PY - 2020
Y1 - 2020
N2 - The authorization mechanism of smart devices is mainly implemented by firmware, yet many smart devices have security issues about their firmware. Limited research has focused on securing the firmware of smart devices, although increasingly more smart devices are used to deal with the very sensitive applications, activities, and data of users. Thus, research on smart device firmware security is of growing importance. Disassembly is a common method for evaluating the security of authorization mechanisms. When disassembling firmware, the processor type of the running environment and the image base of the firmware should first be determined. In general, the processor type can be obtained by tearing down the device or consulting the product manual. However, it is not easy to determine the image base of firmware. Since the processors of many smart devices are ARM architectures, in this paper, we focus on firmware under the ARM architecture and propose an automated method for determining the image base. By studying the storage law of the jump table in the firmware of ARM-based smart devices, we propose an algorithm, named determining the image base by searching jump tables (DBJT), to determine the image base. The experimental results indicate that the proposed method can successfully determine the image base of firmware, which stores the absolute address in the jump table.
AB - The authorization mechanism of smart devices is mainly implemented by firmware, yet many smart devices have security issues about their firmware. Limited research has focused on securing the firmware of smart devices, although increasingly more smart devices are used to deal with the very sensitive applications, activities, and data of users. Thus, research on smart device firmware security is of growing importance. Disassembly is a common method for evaluating the security of authorization mechanisms. When disassembling firmware, the processor type of the running environment and the image base of the firmware should first be determined. In general, the processor type can be obtained by tearing down the device or consulting the product manual. However, it is not easy to determine the image base of firmware. Since the processors of many smart devices are ARM architectures, in this paper, we focus on firmware under the ARM architecture and propose an automated method for determining the image base. By studying the storage law of the jump table in the firmware of ARM-based smart devices, we propose an algorithm, named determining the image base by searching jump tables (DBJT), to determine the image base. The experimental results indicate that the proposed method can successfully determine the image base of firmware, which stores the absolute address in the jump table.
UR - http://www.scopus.com/inward/record.url?scp=85099285237&partnerID=8YFLogxK
U2 - 10.1155/2020/8899193
DO - 10.1155/2020/8899193
M3 - Article
AN - SCOPUS:85099285237
SN - 1530-8669
VL - 2020
JO - Wireless Communications and Mobile Computing
JF - Wireless Communications and Mobile Computing
M1 - 8899193
ER -