Home // IoTAI 2024, The First International Conference on IoT-AI // View article


Identifying Vulnerable Third-party Components in IoT Firmware Using Deep Learning

Authors:
Chia-Mei Chen
Sheng-Hao Lin
Zheng-Xun Cai
Gu-Hsin Lai
Ya-Hui Ou

Keywords: IoT attacks; vulnerability detection; deep learning

Abstract:
To reduce the development time and the cost of Internet of Thing (IoT) products, vendors leverage Third-Party Components (TPCs) to manufacture various types of IoT products. However, such third-party software might not be validated with proper software testing or might contain vulnerabilities. Furthermore, existing research rarely proposed a cross-architecture solution for detecting both top IoT vulnerabilities. Therefore, this study proposes a cross-architecture IoT vulnerability detection method that identifies vulnerable third-party components used in IoT firmware. This study leverages a Siamese Neural Network (SNN) architecture and designs a similarity algorithm to identify vulnerable functions on different processor architectures. The evaluation results demonstrate that the proposed method can identify vulnerable TPCs effectively.

Pages: 1 to 4

Copyright: Copyright (c) IARIA, 2024

Publication date: June 30, 2024

Published in: conference

ISBN: 978-1-68558-183-1

Location: Porto, Portugal

Dates: from June 30, 2024 to July 4, 2024