Skip to main content

Design and Implementation of VxWorks System Vulnerability Mining Framework Based on Dynamic Symbol Execution

  • Conference paper
  • First Online:
Proceedings of the 9th International Conference on Computer Engineering and Networks

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1143))

  • 1170 Accesses

Abstract

In recent years, with the popularity of VxWorks systems in various fields, VxWorks systems have been used in the underlying operating systems of industrial infrastructure in many countries. Therefore, in order to ensure the rights of the country and the people, the security requirements of the system are also increasing. This article introduces the technical details of the VxWorks system vulnerability mining framework based on dynamic symbolic execution, the overall framework flow, and the experimental results of the framework. The entire framework is mainly composed of the WDB RPC-based Trace module, the dynamic symbol execution module, and the fuzzing test module. During the testing phase, the framework successfully exploited the CVE-2015-7599 vulnerability and proved the effectiveness of the vulnerability mining framework designed in this paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. KNOWNSEC: VxWorks Fuzzing: VxWorks real-time operating system vulnerability mining debugging and utilizing secrets. http://www.freebuf.com/news/93201.2016

  2. KNOWNSEC: https://www.zoomeye.org/

  3. Beacon Lab: http://plcscan.org/lab/census/vxworks/

  4. Zmap: ZMap Internet Scanner. https://github.com/zmap/zmap

  5. http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=VxWorks

  6. Moore, H.D.: Shiny Old VxWorks Vulnerabilities (2010). https://community.rapid7.com/community/metasploit/blog/2010/08/02/shiny-old-vxworks-vulnerabilities

  7. Sood, A.K.: Digging Inside the VxWorks OS and Firmware the Holistic Security. SecNiche Security Labs (2011)

    Google Scholar 

  8. Yannick Formaggio, Attacking VxWorks: from Stone Age to Interstellar (2015). https://44con.com/previous-speakers/yannick-formaggio

  9. Wan, W.: Research of Wireless Security Transport Protocol in VxWorks Environment. Information Engineering University (2009)

    Google Scholar 

  10. Tian, L.: Research and Realization on Security Mechanism of Embedded RTOS VxWorks. Nanjing University of Aeronautics and Astronautics (2009)

    Google Scholar 

  11. Tian, Z.L., Liu, L.Q.: The study of security of network file transmission based on VxWorks. Inf. Technol. Informatization 4, 32–35 (2011)

    Google Scholar 

  12. Li, Y.S.: Research and Improvement of Application Layer SSH Security Protocol Based on VxWorks. Nanjing University of Aeronautics and Astronautics (2013)

    Google Scholar 

  13. Bi, J.B.: Research and Implementation of the Open Security Protocol Based on VxWorks. Lanzhou Jiaotong University (2014)

    Google Scholar 

  14. King, J.C.: Symbolic execution and program testing. Commun. ACM 19(7), 385–394 (1976)

    Article  MathSciNet  Google Scholar 

  15. Gedefroid, P., Levin, M.Y., Molnar, D.: Sage: Whitebox fuzzing for security testing. Queue 10(1), 20–27 (2012)

    Article  Google Scholar 

  16. Z3Prover: The Z3 Theorem Prove. https://github.com/Z3Prover/z3

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yu Zhou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zheng, W., Zhou, Y., Wang, B. (2021). Design and Implementation of VxWorks System Vulnerability Mining Framework Based on Dynamic Symbol Execution. In: Liu, Q., Liu, X., Li, L., Zhou, H., Zhao, HH. (eds) Proceedings of the 9th International Conference on Computer Engineering and Networks . Advances in Intelligent Systems and Computing, vol 1143. Springer, Singapore. https://doi.org/10.1007/978-981-15-3753-0_78

Download citation

Publish with us

Policies and ethics