Hunting the Ghost: Towards Automatic Mining of IoT Hidden Services

Abstract
In this paper, we proposes an automatic firmware analysis tool targeting at finding hidden services that may be potentially harmful to the IoT devices. Our approach uses static analysis and symbolic execution to search and filter services that are transparent to normal users but explicit to experienced attackers. A prototype is built and evaluated against a dataset of IoT firmware, and The evaluation shows our tool can find the suspicious hidden services effectively.
View on arXiv@article{dong2025_2505.06822, title={ Hunting the Ghost: Towards Automatic Mining of IoT Hidden Services }, author={ Shuaike Dong and Siyu Shen and Zhou Li and Kehuan Zhang }, journal={arXiv preprint arXiv:2505.06822}, year={ 2025 } }
Comments on this paper