Loading...
Search for:
firmware
0.068 seconds
Embedded System Vulnerability Analysis Approach Based on Firmware Modification Attacks in Industrial Control Systems
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
A wide range of field devices, including Intelligent Electronic Devices (IEDs) and Remote Terminal Units (RTUs), are used in Industrial Control Systems (ICSs). These devices are embedded systems that are responsible for protecting the power system devices against faults and damage by controlling circuit breakers. Disruptions in command and control can result in accidents and harm. Due to their physical accessibility and the possibility of backdoors, blackout attacks may be designed and implemented on these devices in a manner similar to what has occurred in many countries in recent year.Many vulnerabilities have been reported for Real-Time Operating System (RTOS), firmware, and software of...
Fuzzing Based Approach for Vulnerability Analysis of Industrial Equipment in Communication Gateways
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
Ensuring the security and trustworthiness of industrial equipment is a major concern for manufacturers and users across various industries. Industrial control systems include all equipment, networks, and input-output devices that control and automate the process of collecting data, processing it, and generating commands for actuators. As these systems are widely used and play a crucial role in optimizing the use of industrial tools, this research focuses on them. Our research focuses on presenting a comprehensive and precise method that can test industrial control devices communicating with other devices via the IEC 104 protocol. We use a firmware fuzzing approach to assess system weaknesses...
Intelligent Model for Vulnerability Detection and Firmware Binary Code Testing
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
The correct functioning of the systems in the industry depends on the correct functioning of their firmware. It is important to ensure the security of these firmware and guarantee that they have no vulnerabilities in order to prevent attackers from infiltrating the systems. Due to the lack of firmware source code, researchers have always tried to assess the security of firmware and other programs by analyzing their binary codes. Vulnerabilities in applications allow attackers to increase their access rights or make the system unavailable. The two main approaches for binary code analysis are static and dynamic analysis. The need for industrial emulators, which are difficult to design due to...
Reliability Analysis of Embedded Software Using Simulation-Based Fault Injection
, M.Sc. Thesis Sharif University of Technology ; Ejlali, Alireza (Supervisor) ; Asadi, Hossein (Supervisor)
Abstract
With the growth of embedded systems, particularly in the fields of infrastructure and critical services, the role of the Unified Extensible Firmware Interface (UEFI) as a key component in managing the early stages of system initialization and bridging hardware and operating systems has become increasingly significant. This component plays a vital role in ensuring the security and reliability of systems. However, firmware vulnerabilities to accidental or deliberate faults remain a fundamental challenge that can disrupt system performance. Fault injection, a powerful method for analyzing reliability and identifying system weaknesses, previously focused on software, hardware, and operating...