Skip to content

Latest commit

 

History

History
19 lines (13 loc) · 2.02 KB

7_usage_of_debugging_code_and_interfaces.md

File metadata and controls

19 lines (13 loc) · 2.02 KB

Usage of Debugging Code and Interfaces

It is important to ensure all unnecessary pre-production build code, as well as dead and unused code, has been removed prior to firmware release to all market segments. This includes but is not limited to potential backdoor code and root privilege accounts that may have been left by parties such as Original Design Manufacturers (ODM) and Third-Party contractors. Typically this falls in scope for Original Equipment Manufacturers (OEM) to perform via contracts or reverse engineering of binaries. This should also require ODMs to sign Master Service Agreements (MSA) insuring that either no backdoor code is included and that all code has been reviewed for software security vulnerabilities holding all Third-Party developers accountable for devices that are mass deployed into the market.

Considerations (Disclaimer: The List below is non-exhaustive):

  • Remove backdoor accounts used for debugging, deployment verification and/or customer support purposes.
  • Ensure development, diagnostic, or debug features are not included within release builds.
  • Perform code clean up sessions to ensure dead or unused code is removed across repositories
  • Ensure third party libraries and binary images are reviewed for backdoors by staff before market deployment.
    • Tools such as Binwalk, Firmadyne, IDA pro, radare2, Firmware Mod Toolkit (FMK), Firmware Analysis Comparison Toolkit (FACT), and various other tools listed in the additional references (#4) should be utilized for firmware analysis.

Additional References