Empowering IoT Firmware Secure Update with Customization Rights

📅 2025-07-25
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Existing IoT firmware update mechanisms focus on whole-package integrity, overlooking security vulnerabilities introduced by modular customization—making customization-phase vulnerabilities difficult to detect and mitigate. This paper proposes IMUP, the first framework to establish a cross-module integrity chain, enabling secure and efficient firmware updates in large-scale customized deployments. Its core innovations include: (1) chameleon hashing per module for fine-grained integrity assurance; and (2) server-side proof-of-work offloading coupled with caching to jointly optimize security and performance. Experimental evaluation demonstrates that, compared to conventional package-based approaches, IMUP reduces server-side signature generation time by 2.9×, decreases device downtime by 5.9×, and increases the cost of forgery attacks by 300×.

Technology Category

Application Category

📝 Abstract
Firmware updates remain the primary line of defense for IoT devices; however, the update channel itself has become a well-established attack vector. Existing defenses mainly focus on securing monolithic firmware images, leaving module-level customization -a growing user demand-largely unprotected and insufficiently explored. To address this gap, we conduct a pilot study on the update workflows of 200 Linux-based IoT devices across 23 vendors, uncovering five previously undocumented vulnerabilities caused by customization practices. A broader analysis of update-related CVEs from 2020 to 2024 reveals that over half originate from customization-induced issues. These findings highlight a critical yet underexamined reality: as customization increases, so does the attack surface, while current defenses fail to keep pace. We propose IMUP (Integrity-Centric Modular Update Platform), the first framework to address two key challenges: constructing a trustworthy cross-module integrity chain and scaling update performance under mass customization. IMUP combines three techniques: per-module chameleon hashing for integrity, server-side proof-of-work offloading to reduce device overhead, and server-side caching to reuse module combinations, minimizing rebuild costs. Security analysis shows that even when 95 percent of secret keys are exposed, forging a valid image incurs over 300 times the cost of the legitimate server. Experiments on heterogeneous IoT devices demonstrate that IMUP reduces server-side generation time by 2.9 times and device downtime by 5.9 times compared to a package-manager baseline.
Problem

Research questions and friction points this paper is trying to address.

Securing module-level customization in IoT firmware updates
Addressing vulnerabilities from customization in IoT update workflows
Improving update performance and integrity in mass customization
Innovation

Methods, ideas, or system contributions that make the work stand out.

Per-module chameleon hashing for integrity
Server-side proof-of-work offloading for efficiency
Server-side caching to reuse module combinations
🔎 Similar Papers
No similar papers found.
W
Weihao Chen
School of Cyber Science and Engineering, Nanjing University of Science and Technology, Nanjing, China
Y
Yansong Gao
School of Computer Science and Software Engineering, The University of Western Australia, Perth, Australia
B
Boyu Kuang
School of Cyber Science and Engineering, Nanjing University of Science and Technology, Nanjing, China
Jin B. Hong
Jin B. Hong
The University of Western Australia
CybersecurityMoving Target DefensePrivacy
Yuqing Zhang
Yuqing Zhang
University of Groningen
computational linguisticsspeech processing
A
Anmin Fu
School of Cyber Science and Engineering, Nanjing University of Science and Technology, Nanjing, China