Embedded Application Security Best Practices
  • Embedded Application Security Best Practices
  • What are Embedded Systems?
  • Buffer and Stack Overflow Protection
  • Injection Prevention
  • Firmware Updates and Cryptographic Signatures
  • Securing Sensitive Information
  • Identity Management
  • Embedded Framework and C-Based Toolchain Hardening
  • Usage of Debugging Code and Interfaces
  • Transport Layer Security
  • Usage of Data Collection and Storage - Privacy
  • Third Party Code and Components
  • Threat Modeling
  • About OWASP
Powered by GitBook
On this page

Was this helpful?

Usage of Debugging Code and Interfaces

PreviousEmbedded Framework and C-Based Toolchain HardeningNextTransport Layer Security

Last updated 4 years ago

Was this helpful?

It is important to ensure all unnecessary pre-production build code, as well as dead and unused code, has been removed prior to firmware release to all market segments. This includes but is not limited to potential backdoor code and root privilege accounts that may have been left by parties such as Original Design Manufacturers (ODM) and Third-Party contractors. Typically this falls in scope for Original Equipment Manufacturers (OEM) to perform via contracts or reverse engineering of binaries. This should also require ODMs to sign Master Service Agreements (MSA) insuring that either no backdoor code is included and that all code has been reviewed for software security vulnerabilities holding all Third-Party developers accountable for devices that are mass deployed into the market.

Considerations (Disclaimer: The List below is non-exhaustive):

  • Remove backdoor accounts used for debugging, deployment verification and/or customer support purposes.

  • Ensure development, diagnostic, or debug features are not included within release builds.

  • Perform code clean up sessions to ensure dead or unused code is removed across repositories

  • Ensure third party libraries and binary images are reviewed for backdoors by staff before market deployment.

    • Tools such as Binwalk, Firmadyne, IDA pro, radare2, Firmware Mod Toolkit (FMK), Firmware Analysis Comparison Toolkit (FACT), and various other tools listed in the additional references (#4) should be utilized for firmware analysis.

Additional References

https://www.owasp.org/index.php/Leftover_Debug_Code
https://cwe.mitre.org/data/definitions/489.html
http://www.kb.cert.org/vuls/id/419568
Firmware and binary analysis tool index