2022/9/28

Opening Pandora’s box: effective techniques for reverse engineering IoT devices

Omer Shwartz, Yael Mathov, Michael Bohadana, Yuval Elovici, Yossi Oren

Smart Card Research and Advanced Applications: 16th International Conference …, 2018

With the growth of the Internet of Things, many insecure embedded devices are entering into our homes and businesses. Some of these web-connected devices lack even basic security protections such as secure password authentication. As a result, thousands of IoT devices have already been infected with malware and enlisted into malicious botnets and many more are left vulnerable to exploitation.In this paper we analyze the practical security level of 16 popular IoT devices from high-end and low-end manufacturers. We present several low-cost black-box techniques for reverse engineering these devices, including software and fault injection based techniques for bypassing password protection. We use these techniques to recover device firmware and passwords. We also discover several common design flaws which lead to previously unknown vulnerabilities. We demonstrate the effectiveness …