Command injection vulnerabilities are among the most common and dangerous attack vectors in IoT devices. Current detection approaches can detect single-step injection vulnerabilities well by fuzzing tests. However, an attacker could inject malicious commands in an IoT device via a multi-step exploit if he first abuses an interface to store the injection payload and later use it in a command interpreter through another interface. We identify a large class of such multi-step injection attacks to address these stealthy and harmful threats and define them as higher-order command injection vulnerabilities (HOCIVs). We develop an automatic system named Request Linking (ReLink) to detect data stores that would be transferred to command interpreters and then identify HOCIVs. ReLink is validated on an experimental embedded system injected with 150 HOCIVs. According to the experimental results, ReLink is significantly better than existing command injection detection tools in terms of detection rate, test space and time.
CITATION STYLE
Yu, L., Wang, H., Li, L., & He, H. (2021). Towards Automated Detection of Higher-Order Command Injection Vulnerabilities in IoT Devices. International Journal of Digital Crime and Forensics, 13(6), 1–14. https://doi.org/10.4018/ijdcf.286755
Mendeley helps you to discover research relevant for your work.