Fuzzy Hashing on Firmwares Images: A Comparative Analysis

Daojing He, Xiaohu Yu, Shanshan Zhu*, Sammy Chan, Mohsen Guizani

*Corresponding author for this work

Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

2 Citations (Scopus)

Abstract

With the fast development of the Internet of Things (IoT) technology, there are more and more attacks against IoT devices, and IoT security issues have attracted considerable attention. Due to the widespread phenomenon that different IoT firmwares reuse the same code, code similarity comparison is an important technique for IoT security analysis. Fuzzy hashing generates fingerprints of files by converting them into intermediate expressions and hashing such expressions, evaluating the fingerprint similarity and thus evaluating the similarity of files that are not identical. In this paper, we analyze and compare today's most widely used fuzzy hashing tools, and classify them in detail. In addition, we also analyze the advantages and disadvantages of different algorithms used by these fuzzy hashing tools. Finally, we select a few of the most convincing fuzzy hashing tools, such as ssdeep and TLSH, for performance comparison by experimental analysis on real firmware datasets. © 2022 IEEE
Original languageEnglish
Pages (from-to)45-50
JournalIEEE Internet Computing
Volume27
Issue number2
Online published1 Dec 2022
DOIs
Publication statusPublished - Mar 2023

Funding

This research work was supported in part by the National Natural Science Foundation of China under Grant U1936120, in part by the National Key R&D Program of China under Grant, in part by the Fok Ying Tung Education Foundation of China under Grant 171058, and in part by the University Grants Committee of the Hong Kong Special Administrative Region, China, under Project CityU 11201421.

Research Keywords

  • firmware
  • fuzzy hashing
  • homology
  • Internet of Things

RGC Funding Information

  • RGC-funded

Fingerprint

Dive into the research topics of 'Fuzzy Hashing on Firmwares Images: A Comparative Analysis'. Together they form a unique fingerprint.

Cite this