Hunting the Ghost: Towards Automatic Mining of IoT Hidden Services
Hunting the Ghost: Towards Automatic Mining of IoT Hidden Services
In this paper, we proposes an automatic firmware analysis tool targeting at finding hidden services that may be potentially harmful to the IoT devices. Our approach uses static analysis and symbolic execution to search and filter services that are transparent to normal users but explicit to experienced attackers. A prototype is built and evaluated against a dataset of IoT firmware, and The evaluation shows our tool can find the suspicious hidden services effectively.
Zhou Li、Siyu Shen、Shuaike Dong、Kehuan Zhang
计算技术、计算机技术
Zhou Li,Siyu Shen,Shuaike Dong,Kehuan Zhang.Hunting the Ghost: Towards Automatic Mining of IoT Hidden Services[EB/OL].(2025-05-10)[2025-06-07].https://arxiv.org/abs/2505.06822.点此复制
评论