Skip to main content
Article
Firmware Vulnerabilities Homology Detection Based on Clonal Selection Algorithm for IoT Devices
IEEE Internet of Things Journal
  • Daojing He, East China Normal University
  • Xiaohu Yu, East China Normal University
  • Tinghui Li, East China Normal University
  • Sammy Chan, City University of Hong Kong
  • Mohsen Guizani, Mohamed bin Zayed University of Artificial Intelligence
Document Type
Article
Abstract

With the wide application of Internet of Things (IoT) devices, security attacks against their firmware often occur, which has attracted more attention from the research community. Firmware is an important part of IoT devices, and attacks against them is one of the main means to destroy IoT devices. Therefore, firmware security is the core of the overall security of devices. At present, most of the firmware vulnerabilities have a small number of related samples, so it is difficult to use machine learning methods to generate detectors for some specific vulnerabilities. Therefore, based on the collected data of related firmware vulnerabilities, this paper proposes a firmware vulnerability homology detection method based on the clonal selection algorithm. We design the numerical and structural characteristics of vulnerability functions, train a detector for each function separately, and improve the recall rate of vulnerability detection. Compared with existing machine learning methods, this method only depends on the affinity between the objective function and the detector, which avoids the requirement of a large number of sample data sets. Finally, relevant experiments are carried out to verify the effectiveness of the method.

DOI
10.1109/JIOT.2022.3152364
Publication Date
2-17-2022
Keywords
  • clonal selection,
  • detectors,
  • feature extraction,
  • firmware,
  • homology,
  • Internet of Things,
  • Internet of Things,
  • Machine learning,
  • security,
  • semantics,
  • simulated annealing
Disciplines
Comments

IR deposit conditions:

  • OA version (accepted version) pathway a
  • No embargo
  • When accepted for publication, set statement to accompany deposit (see policy)
  • Must link to publisher version with DOI
  • Publisher copyright and source must be acknowledged
Citation Information
D. He, X. Yu, T. Li, S. Chan, and M. Guizani, "Firmware vulnerabilities homology detection based on clonal selection algorithm for IoT Devices," in IEEE Internet of Things Journal, doi: 10.1109/JIOT.2022.3152364.