Open Access iconOpen Access



Research on Known Vulnerability Detection Method Based on Firmware Analysis

Wenjing Wang1, Tengteng Zhao1, Xiaolong Li1,*, Lei Huang1, Wei Zhang1, Hui Guo2

1 Beijing Institute of Control and Electronics Technology, Beijing, 100038, China
2 State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China

* Corresponding Author: Xiaolong Li. Email: email

Journal of Cyber Security 2022, 4(1), 1-15.


At present, the network security situation is becoming more and more serious. Malicious network attacks such as computer viruses, Trojans and hacker attacks are becoming more and more rampant. National and group network attacks such as network information war and network terrorism have a serious damage to the production and life of the whole society. At the same time, with the rapid development of Internet of Things and the arrival of 5G era, IoT devices as an important part of industrial Internet system, have become an important target of infiltration attacks by hostile forces. This paper describes the challenges facing firmware vulnerability detection at this stage, and introduces four automatic detection and utilization technologies in detail: based on patch comparison, based on control flow, based on data flow and ROP attack against buffer vulnerabilities. On the basis of clarifying its core idea, main steps and experimental results, the limitations of its method are proposed. Finally, combined with four automatic detection methods, this paper summarizes the known vulnerability detection steps based on firmware analysis, and looks forward to the follow-up work.


Cite This Article

APA Style
Wang, W., Zhao, T., Li, X., Huang, L., Zhang, W. et al. (2022). Research on known vulnerability detection method based on firmware analysis. Journal of Cyber Security, 4(1), 1-15.
Vancouver Style
Wang W, Zhao T, Li X, Huang L, Zhang W, Guo H. Research on known vulnerability detection method based on firmware analysis. J Cyber Secur . 2022;4(1):1-15
IEEE Style
W. Wang, T. Zhao, X. Li, L. Huang, W. Zhang, and H. Guo "Research on Known Vulnerability Detection Method Based on Firmware Analysis," J. Cyber Secur. , vol. 4, no. 1, pp. 1-15. 2022.

cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1334


  • 870


  • 0


Share Link