Dyanmic analysis is a useful solution for malware analysis while the complicated IoT hardware architecture and peripherals make automatic emulation of IoT devices challenging. This course will focus on how to apply recent firmware rehosting technologies (such as Firmadyne, FirmAE) to operate commerical firmware in emulated IoT systems. Moreove, we will introduce well known vulnerability discoverying tools to enable dynamic analysis to the emulated IoT devices.
The participants could understand how to rehost commerical IoT firmware in the emulated IoT devices. Moreover, they could know how to leverage vulnerability discovering tools to analyze emulated IoT devices in a dynamic fashion
Introduction to IoT attacks, firmware emulation, firmware analysis, vulnerability discovery
notebook and VM installation are necessary
Linux
National Taiwan University of Sciecne and Technology Professor, Department of Computer Science and Information Engineering
Shin-Ming Cheng received his B.S. and Ph.D. degrees in computer science and information engineering from the National Taiwan University, Taipei, Taiwan, in 2000 and 2007, respectively. Since 2012, he has been on the faculty of the Department of Computer Science and Information Engineering, National Taiwan University of Science and Technology, Taipei, where he is currently a professor. Since 2017, he has been with the Research Center for Information Technology Innovation, Academia Sinica, Taipei, as a joint assistant research fellow. Since 2014, he incubates cybersecurity talent with the support of the Ministry of Education and holds advanced information security summer schools (AIS3) each year. His current interests are mobile network security and IoT system security. Recently, he investigates malware analysis and AI robustness. He has received IEEE Trustcom 2020, CISC 2020/2021, TANET 2021 best paper awards due to his solid research in cybersecurity.