Abstract
In recent years, with the popularity of VxWorks systems in various fields, VxWorks systems have been used in the underlying operating systems of industrial infrastructure in many countries. Therefore, in order to ensure the rights of the country and the people, the security requirements of the system are also increasing. This article introduces the technical details of the VxWorks system vulnerability mining framework based on dynamic symbolic execution, the overall framework flow, and the experimental results of the framework. The entire framework is mainly composed of the WDB RPC-based Trace module, the dynamic symbol execution module, and the fuzzing test module. During the testing phase, the framework successfully exploited the CVE-2015-7599 vulnerability and proved the effectiveness of the vulnerability mining framework designed in this paper.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
KNOWNSEC: VxWorks Fuzzing: VxWorks real-time operating system vulnerability mining debugging and utilizing secrets. http://www.freebuf.com/news/93201.2016
KNOWNSEC: https://www.zoomeye.org/
Beacon Lab: http://plcscan.org/lab/census/vxworks/
Zmap: ZMap Internet Scanner. https://github.com/zmap/zmap
Moore, H.D.: Shiny Old VxWorks Vulnerabilities (2010). https://community.rapid7.com/community/metasploit/blog/2010/08/02/shiny-old-vxworks-vulnerabilities
Sood, A.K.: Digging Inside the VxWorks OS and Firmware the Holistic Security. SecNiche Security Labs (2011)
Yannick Formaggio, Attacking VxWorks: from Stone Age to Interstellar (2015). https://44con.com/previous-speakers/yannick-formaggio
Wan, W.: Research of Wireless Security Transport Protocol in VxWorks Environment. Information Engineering University (2009)
Tian, L.: Research and Realization on Security Mechanism of Embedded RTOS VxWorks. Nanjing University of Aeronautics and Astronautics (2009)
Tian, Z.L., Liu, L.Q.: The study of security of network file transmission based on VxWorks. Inf. Technol. Informatization 4, 32–35 (2011)
Li, Y.S.: Research and Improvement of Application Layer SSH Security Protocol Based on VxWorks. Nanjing University of Aeronautics and Astronautics (2013)
Bi, J.B.: Research and Implementation of the Open Security Protocol Based on VxWorks. Lanzhou Jiaotong University (2014)
King, J.C.: Symbolic execution and program testing. Commun. ACM 19(7), 385–394 (1976)
Gedefroid, P., Levin, M.Y., Molnar, D.: Sage: Whitebox fuzzing for security testing. Queue 10(1), 20–27 (2012)
Z3Prover: The Z3 Theorem Prove. https://github.com/Z3Prover/z3
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Zheng, W., Zhou, Y., Wang, B. (2021). Design and Implementation of VxWorks System Vulnerability Mining Framework Based on Dynamic Symbol Execution. In: Liu, Q., Liu, X., Li, L., Zhou, H., Zhao, HH. (eds) Proceedings of the 9th International Conference on Computer Engineering and Networks . Advances in Intelligent Systems and Computing, vol 1143. Springer, Singapore. https://doi.org/10.1007/978-981-15-3753-0_78
Download citation
DOI: https://doi.org/10.1007/978-981-15-3753-0_78
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-3752-3
Online ISBN: 978-981-15-3753-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)