论文标题

底层安全:通过仿真进行消毒的模糊

BaseSAFE: Baseband SAnitized Fuzzing through Emulation

论文作者

Maier, Dominik, Seidel, Lukas, Park, Shinjo

论文摘要

流氓基站是一个有效的攻击向量。蜂窝基带代表了智能手机安全性的关键部分:它们甚至在身份验证之前就可以解析大量数据。因此,他们可以授予攻击者一种非常隐秘的方式,可以收集有关呼叫的信息,甚至可以升级到主操作系统,即无线操作系统。在本文中,我们讨论了一个新型的细胞模糊框架,旨在帮助安全研究人员在细胞基带和类似的嵌入式系统中找到关键的错误。 BaseSafe允许部分重新安置蜂窝基带,以进行快速仪器的伪造,即使对于封闭源固件斑点也是如此。 BaseSafe的消毒液滴分配器,可以快速发现基于堆的缓冲区反射。使用我们的概念验证线束,我们构成了基于RTOS的基于RTOS的核心细胞基带的各种解析器,这些分析器可从Rogue Base Station访问。模拟器仪器进行了高度优化,对于我们的复杂测试案例,每个核心每秒执行数百个执行,总共约为15k测试案例。此外,我们讨论了基带调制解调器的攻击向量。据我们所知,这是首次使用基于仿真的模糊用于商业蜂窝基带的安全测试。 BaseSafe的大多数工具和方法也适用于其他低级内核和固件。使用BaseSafe,我们能够找到记忆损坏,包括使用我们的概念证明模糊的线束在Mediatek Cellular基带中写下。本文发表后,将发布底层安全,安全带和大量LTE信号消息测试案例。

Rogue base stations are an effective attack vector. Cellular basebands represent a critical part of the smartphone's security: they parse large amounts of data even before authentication. They can, therefore, grant an attacker a very stealthy way to gather information about calls placed and even to escalate to the main operating system, over-the-air. In this paper, we discuss a novel cellular fuzzing framework that aims to help security researchers find critical bugs in cellular basebands and similar embedded systems. BaseSAFE allows partial rehosting of cellular basebands for fast instrumented fuzzing off-device, even for closed-source firmware blobs. BaseSAFE's sanitizing drop-in allocator, enables spotting heap-based buffer-overflows quickly. Using our proof-of-concept harness, we fuzzed various parsers of the Nucleus RTOS-based MediaTek cellular baseband that are accessible from rogue base stations. The emulator instrumentation is highly optimized, reaching hundreds of executions per second on each core for our complex test case, around 15k test-cases per second in total. Furthermore, we discuss attack vectors for baseband modems. To the best of our knowledge, this is the first use of emulation-based fuzzing for security testing of commercial cellular basebands. Most of the tooling and approaches of BaseSAFE are also applicable for other low-level kernels and firmware. Using BaseSAFE, we were able to find memory corruptions including heap out-of-bounds writes using our proof-of-concept fuzzing harness in the MediaTek cellular baseband. BaseSAFE, the harness, and a large collection of LTE signaling message test cases will be released open-source upon publication of this paper.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源