|国家预印本平台
首页|Hunting the Ghost: Towards Automatic Mining of IoT Hidden Services

Hunting the Ghost: Towards Automatic Mining of IoT Hidden Services

Hunting the Ghost: Towards Automatic Mining of IoT Hidden Services

来源:Arxiv_logoArxiv
英文摘要

In this paper, we proposes an automatic firmware analysis tool targeting at finding hidden services that may be potentially harmful to the IoT devices. Our approach uses static analysis and symbolic execution to search and filter services that are transparent to normal users but explicit to experienced attackers. A prototype is built and evaluated against a dataset of IoT firmware, and The evaluation shows our tool can find the suspicious hidden services effectively.

Zhou Li、Siyu Shen、Shuaike Dong、Kehuan Zhang

计算技术、计算机技术

Zhou Li,Siyu Shen,Shuaike Dong,Kehuan Zhang.Hunting the Ghost: Towards Automatic Mining of IoT Hidden Services[EB/OL].(2025-05-10)[2025-06-07].https://arxiv.org/abs/2505.06822.点此复制

评论