ICST 2025
Mon 31 March - Fri 4 April 2025 Naples, Italy
Mon 31 Mar 2025 14:00 - 14:30 at Room A1 - Cyber-Physical Systems

Firmware attacks pose significant security risks to IoT devices due to often insufficient security protection. Such attacks can result in data breaches, privacy violations, and operational disruptions. For example, attackers can alter the structure of packets (e.g., header, payload) to create malformed packets and send them to nodes in a victim network. Those packets then remotely trigger vulnerabilities (e.g., buffer overflows) present in the firmware, potentially resulting in crashes or undefined behavior. In this paper, we first investigate how firmware vulnerabilities (e.g., out-of-bounds errors) can be remotely exploited in 6LoWPAN-based IoT networks by analyzing bug reports from IoT projects. Then, we introduce a protocol fuzzing framework that leverages the GPT-4 model to guide the creation of test cases as malformed packets. Later, these packets are sent to nodes to detect potential vulnerabilities. For evaluation, we build a testing network composed of real IoT devices to execute the test cases. As a result, we discovered four new vulnerabilities, including three cases of uncontrolled resource consumption and one issue of improper input validation, which can be remotely exploited in the Contiki-NG operating system.

Mon 31 Mar

Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change

14:00 - 15:00
Cyber-Physical SystemsITEQS at Room A1

Session chiar: Abdul Rauf (Test Scouts AB)

14:00
30m
Talk
A Protocol Fuzzing Framework to Detect Remotely Exploitable Vulnerabilities in IoT NodesBest Paper Candidate
ITEQS
Phi Tuong Lau NaN, Stefan Katzenbeisser University of Passau
14:30
30m
Talk
Unified Search for Multi-Requirement Falsification for Cyber-Physical Systems
ITEQS
Jesper Winsten Åbo Akademi University, Ivan Porres Åbo Akademi University
:
:
:
: