This paper is published in Volume-7, Issue-3, 2021
Area
Reverse Engineering
Author
Akash C. Koturwar, Dr. V. K. Pachghare, Sharad Hange
Org/Univ
College of Engineering, Pune, Maharashtra, India
Pub. Date
07 June, 2021
Paper ID
V7I3-1488
Publisher
Keywords
Reverse Engineering Firmware Security

Citationsacebook

IEEE
Akash C. Koturwar, Dr. V. K. Pachghare, Sharad Hange. A Practical approach for Firmware Reverse Engineering, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Akash C. Koturwar, Dr. V. K. Pachghare, Sharad Hange (2021). A Practical approach for Firmware Reverse Engineering. International Journal of Advance Research, Ideas and Innovations in Technology, 7(3) www.IJARIIT.com.

MLA
Akash C. Koturwar, Dr. V. K. Pachghare, Sharad Hange. "A Practical approach for Firmware Reverse Engineering." International Journal of Advance Research, Ideas and Innovations in Technology 7.3 (2021). www.IJARIIT.com.

Abstract

Embedded products have become widely used entities in the network of households and enterprises. The exponential increment in its use has resulted in a lapse in security measures taken while building these products, leaving them vulnerable to security attacks. An important feature is that embedded devices work on what is commonly known as Firmware, Firmware, a piece of software that helps the embedded devices to work on the shared task. Securing the firmware will be an important step in securing the embedded product setup. To secure the firmware one needs to understand how the firmware works. One way to do so is to reverse engineering. Through reverse engineering, one can attempt to understand the device architecture, functionality, and potential vulnerabilities present in the device. A better understanding of the firmware implementation also helps in adding features if needed. This project aims to apply several types of reverse engineering techniques to increase the efficiency of reverse-engineering the firmware and find the vulnerabilities in a firmware-based setup. Also, estimate the level of damage the identified vulnerabilities can cause through rigorous penetration testing.