UEFI-based Research on the Inner Operation Mechanism and Characteristics of Firmware Vulnerabilities in Key Devices of Electric Power Monitoring Systems

Author:

Chen Mingliang12,Yu Yingting1,Xie Guoqiang1,Zeng Chuanhan1,Xu Zaide1

Affiliation:

1. State Grid Jiangxi Electric Power Co., Ltd ., Nanchang , Jiangxi , , China .

2. Xi’an Jiaotong University , Xi’an , Shaanxi , , China .

Abstract

Abstract With the large number of computer technology and modern communication technology used in power monitoring systems, its security protection is constantly facing new challenges. The UEFI firmware is used to construct the physical connection structure of key devices in the power monitoring system in this paper. Using fuzzy testing methods to mine the vulnerabilities existing in the power monitoring system by generating a large number of variant test cases as the monitoring object, based on the collection of information of the basic blocks covered during the test run of the vulnerability seed to determine the target point to which the seed belongs. The coverage weight of the seed is determined with the help of the simulated annealing algorithm in order to accomplish task division of the target point. The fuzzy test method is used to analyze the operation mechanism and characteristics of the vulnerabilities in the power monitoring system, and the firmware attack mechanism of different HOOKs under UEFI is explored to summarize the characteristics of the scenarios in which the vulnerabilities appear in the power system as well as their impacts. The results show that the impact caused by vulnerabilities in the power monitoring system on the generation side and transmission side is mainly to damage the integrity and availability of information, the integrity and availability of the vulnerabilities in the generation side of the production side of the device with a risk rating of 63.74, 71.73, respectively, and the vulnerabilities in the transmission side of the SCADA with a risk rating of 79.04, 69.36, respectively. The vulnerabilities detected 608 security vulnerabilities were implanted in the UEF module, and 653 possible security problems were reported by the detection, of which the statistical underreporting rate was 1.48% and the false alarm rate was 9.05%.

Publisher

Walter de Gruyter GmbH

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3