×

Method and apparatus for securing embedded device firmware

  • US 10,657,262 B1
  • Filed: 09/28/2015
  • Issued: 05/19/2020
  • Est. Priority Date: 09/28/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method of embedded device vulnerability identification and mitigation, comprising:

  • injecting at least one security software component into a vulnerable firmware binary to create a monitored firmware binary, wherein the at least one security software component hooks into an exception handling code of the vulnerable firmware binary;

    loading the monitored firmware binary into an embedded device;

    collecting a plurality of live forensic information related to the monitored firmware binary via the at least one security software component of the monitored firmware binary, wherein the live forensic information comprises dynamically generated information related to the monitored firmware binary that is collected when the embedded device is in an online state;

    aggregating the plurality of live forensic information and static analysis data generated by one or more static analysis techniques, wherein the static analysis data comprises data generated before operation of the vulnerable firmware binary;

    detecting an unauthorized modification to the monitored firmware binary by the at least one security software component based on the aggregated live forensic information and static analysis data, the security software component is designed to detect an unauthorized modification of at least one in memory data item acted upon by one or more functions of the monitored firmware binary embodied in native firmware code of the vulnerable firmware binary;

    identifying one or more areas within the monitored firmware binary to modify to address the detected unauthorized modification comprising mapping the detected unauthorized modification to one or more in-memory data items;

    modifying the identified one or more areas within the monitored firmware binary while the monitored firmware binary is running to change firmware code of the vulnerable firmware binary to create a hardened firmware binary and to mitigate exploitation of the identified one or more areas within the monitored firmware binary; and

    communicating the collected live forensic information to other embedded devices in a network where the embedded device is deployed,wherein to mitigate exploitation comprises one or more of deactivating code strings in the identified one or more areas associated with the firmware binary, removing code strings in the identified one or more areas associated with the firmware binary, or obfuscating code strings in the identified one or more areas associated with the firmware binary,wherein the hardened firmware binary is functionally equivalent to the vulnerable firmware binary and the monitored firmware binary.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×