Embedded and IoT Devices Firmware Security

Authors

Corressponding author's email:

doandc@hcmute.edu.vn

DOI:

https://doi.org/10.54644/jte.2025.1836

Keywords:

Embedded security, Internet of Things (IoT), IoT security, Firmware security, Firmware analysis

Abstract

The Internet of Things (IoT) has gone a long way since its inception. However, the standardization process in IoT systems for IoT safety solutions is still in its early stages. Lots of studies have been conducted on its quality evaluation to address threats to IoT across different layers. However, most current works have failed to take into their consideration of the security aspects of the firmware in the IoT ecosystem. The lack of a comprehensive survey on IoT firmware security aims to highlight the important reasons for a firmware insecurity in IoT, list vulnerabilities, and perform an in-depth review of the key analysis techniques. Such rapid development has made IoT and embedded systems become interesting targets for potential attackers, especially the firmware attacks. This Article hereby presents some information related to the device firmware as started by highlighting the importance of the firmware security, classifying the vulnerabilities in IoT, the processes of analyzing the firmware vulnerabilities through some Open source tools, and as illustrated by analyzing some firmwares of the popular devices.  

Downloads: 0

Download data is not yet available.

Author Biography

Cong Doan Dinh, Ho Chi Minh City University of Technology and Education, Vietnam

Cong Doan Dinh graduated from the Faculty of Electronics and Telecommunication in 1999 and then was granted with a Master’s degree in Computer Science in 2002 by the HCMC University of Technology. He is currently working at the Faculty of Information Technology, the HCMC University of Technology and Education. His research interests include Network Security, Data Communications, Logic Design, IoT, Embedded Systems related technologies. Email: doandc@hcmute.edu.vn. ORCID:  https://orcid.org/0009-0004-2138-5939

References

D. G. Akestoridis, Firmware Analysis of Embedded Systems, Carnegie Mellon University, 2018.

A. Cui, M. Costello, and S. J. Stolfo, “When Firmware Modifications Attack: A Case Study of Embedded Exploitation,” Department of Computer Science, Columbia University, New York, USA, 2013.

I. Nadir, H. Mahmood, and G. Asadullah, “A Taxonomy of IoT Firmware Security and Principal Analysis Techniques,” Elsevier, Feb. 15, 2021. DOI: https://doi.org/10.1016/j.ijcip.2022.100552

F. Boland, Automated Security Analysis of Firmware, KTH Royal Institute of Technology, Stockholm, Sweden, 2022.

Vina Aspire, “More than 80% of Global Businesses are Victims of Firmware Attacks,” [Online]. Available: https://vina-aspire.com/hon-80-doanh-nghiep-toan-cau-la-nan-nhan-cua-cuoc-tan-cong-firmware/

Techpro, “Vietnamese Voice Warning Firmware on Suprema FSF2 and BS3,” [Online]. Available: https://techpro.vn/vi/tin-tuc/firmware-canh-bao-am-thanh-giong-noi-tieng-viet-tren-suprema-fsf2-va-bs3.html

L. Phuong, “Vietnamese Scientists Gradually Master Hardware Security Solutions,” Journal of Information and Communications, 2019.

H. Minh, “Security Camera Equipment Standards to Be Developed,” [Online]. Available: https://baochinhphu.vn/se-xay-dung-cac-tieu-chuan-thiet-bi-camera-an-ninh-102230728164637256.htm, 2023.

A. Bhardwaj, K. Kaushik, S. Bharany, and S. Kim, “Forensic Analysis and Security Assessment of IoT Camera Firmware for Smart Homes,” Egyptian Informatics Journal, vol. 24, no. 4, p. 100409, Dec. 2023. DOI: https://doi.org/10.1016/j.eij.2023.100409

M. Muench, Dynamic Binary Firmware Analysis: Challenges & Solutions, Sorbonne Université, 2021.

X. Zhou, P. Wang, L. Zhou, P. Xun, and K. Lu, “A Survey of the Security Analysis of Embedded Devices,” Sensors, 2023. DOI: https://doi.org/10.3390/s23229221

Prabhankar, “Firmware Analysis Part-1,2,” 2021. [Online]. Available: https://prabhankar.medium.com/firmware-analysis-part-1-cd43a1ad3f38

NSE Hacking Lab, “PenTest Process Planning,” [Online]. Available: https://nse.digital/pages/guides/pentest-process-planning.html

T. Bakhshi, B. Ghita, and I. Kuzminykh, “A Review of IoT Firmware Vulnerabilities and Auditing Techniques,” PMCID: PMC10821153, 2024. DOI: https://doi.org/10.3390/s24020708

R. Lyda, J. Sparta, and B. Hamrock, “Using Entropy Analysis to Find Encrypted and Packed Malware,” IEEE Computer Society, 2007. DOI: https://doi.org/10.1109/MSP.2007.48

Whiteheart0, “Entropy Analysis: A Critical Test for Malware,” [Online]. Available: https://whiteheart0.medium.com/entropy-analysis-a-critical-test-for-malwares-69939f5b8b1

F. Á. Wic, J. M. G. Moreno, and A. V. Blanco, “IoT and Embedded Devices Security Analysis Following OWASP,” [Online]. Available: https://www.tarlogic.com/blog/security-analysis-on-iot-owasp, 2022.

T. C. Clancy, R. Gerdes, Y. Yang, J. Black, P. Schaumont, and D. A. Brown, “Analysis of Firmware Security in Embedded ARM Environments,” Arlington, Virginia, 2019.

S. U. Haq, Y. Singh, A. Sharma, R. Gupta, and D. Gupta, “A Survey on IoT & Embedded Device Firmware Security: Architecture, Extraction Techniques, and Vulnerability Analysis Frameworks,” Springer, 2023. DOI: https://doi.org/10.1007/s43926-023-00045-2

P. Bourmeau, “A Brief Introduction to Firmware Extraction,” 2020.

S. Vasile, D. Oswald, and T. Chothia, “Breaking All the Things – A Systematic Survey of Firmware Extraction Techniques for IoT Devices,” University of Birmingham, 2018. DOI: https://doi.org/10.1007/978-3-030-15462-2_12

J. M. Smith, “Case Analysis of Firmware Vulnerabilities and Exploitation,” 2016.

R. Sharma, “Unveiling Vulnerabilities: A Deep Dive into Firmware Penetration Testing – Part 1,” Sep. 19, 2023. [Online]. Available: https://ravi73079.medium.com/unveiling-vulnerabilities-a-deep-dive-into-firmware-penetration-testing-part-1-904599cd79be

D. de Ruck, V. Goeman, and J. Lapon, “Hands-on Workshop: Hacking and Protecting Embedded Devices,” June 2022.

Downloads

Published

28-08-2025

How to Cite

[1]
Cong Doan Dinh, “Embedded and IoT Devices Firmware Security”, JTE, vol. 20, no. 03, pp. 58–67, Aug. 2025.

Issue

Section

Research Article

Categories