Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Conferences, Workshops, Symposiums, and Seminars
  4. SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices
 
conference paper

SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices

Wang, Qinying
•
Chang, Boyu
•
Ji, Shouling
Show more
2024
Proceedings - IEEE Symposium on Security and Privacy
45 IEEE Symposium on Security and Privacy

Trusted Execution Environments (TEEs) embedded in IoT devices provide a deployable solution to secure IoT applications at the hardware level. By design, in TEEs, the Trusted Operating System (Trusted OS) is the primary component. It enables the TEE to use security-based design techniques, such as data encryption and identity authentication. Once a Trusted OS has been exploited, the TEE can no longer ensure security. However, Trusted OSes for IoT devices have received little security analysis, which is challenging from several perspectives: (1) Trusted OSes are closed-source and have an unfavorable environment for sending test cases and collecting feedback. (2) Trusted OSes have complex data structures and require a stateful workflow, which limits existing vulnerability detection tools.To address the challenges, we present SyzTrust, the first state-aware fuzzing framework for vetting the security of resource-limited Trusted OSes. SyzTrust adopts a hardware-assisted framework to enable fuzzing Trusted OSes directly on IoT devices as well as tracking state and code coverage non-invasively. SyzTrust utilizes composite feedback to guide the fuzzer to effectively explore more states as well as to increase the code coverage. We evaluate SyzTrust on Trusted OSes from three major vendors: Samsung, Tsinglink Cloud, and Ali Cloud. These systems run on Cortex M23/33 MCUs, which provide the necessary abstraction for embedded TEEs. We discovered 70 previously unknown vulnerabilities in their Trusted OSes, receiving 10 new CVEs so far. Furthermore, compared to the baseline, SyzTrust has demonstrated significant improvements, including 66% higher code coverage, 651% higher state coverage, and 31% improved vulnerability-finding capability. We report all discovered new vulnerabilities to vendors and open source SyzTrust.

  • Details
  • Metrics
Type
conference paper
DOI
10.1109/SP54263.2024.00070
Scopus ID

2-s2.0-85204049712

Author(s)
Wang, Qinying

Zhejiang University

Chang, Boyu

Zhejiang University

Ji, Shouling

Zhejiang University

Tian, Yuan

University of California, Los Angeles

Zhang, Xuhong

Zhejiang University

Zhao, Binbin

Georgia Institute of Technology

Pan, Gaoning

Zhejiang University

Lyu, Chenyang

Zhejiang University

Payer, Mathias  

École Polytechnique Fédérale de Lausanne

Wang, Wenhai

Zhejiang University

Show more
Date Issued

2024

Publisher

Institute of Electrical and Electronics Engineers Inc.

Published in
Proceedings - IEEE Symposium on Security and Privacy
ISBN of the book

9798350331301

Start page

2310

End page

2327

Editorial or Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
HEXHIVE  
Event nameEvent acronymEvent placeEvent date
45 IEEE Symposium on Security and Privacy

San Francisco, United States

2024-05-20 - 2024-05-23

FunderFunding(s)Grant NumberGrant URL

State Key Laboratory of Computer Architecture

Zhejiang University

China Scholarship Council

Show more
Available on Infoscience
April 4, 2025
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/248594
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés