A unified evaluation framework for cryptographic algorithm identification tools in IoT firmware
Yi-Fei LI , Xiao-Yang ZHOU , Jie-Wei DU , Cheng-Yu HU , Jin SHI , Shan-Qing GUO
Front. Comput. Sci. ›› 2026, Vol. 20 ›› Issue (10) : 2010810
A unified evaluation framework for cryptographic algorithm identification tools in IoT firmware
The rapid growth of Internet of Things (IoT) devices has increased security risks due to cryptographic misuse in firmware, including vulnerable algorithms and misconfigurations. Accurate identification of cryptographic algorithms in firmware is fundamental for firmware analysis, while existing tools, usually designed for x86 platform, struggle with IoT-specific architectures, file formats, and instruction sets. Currently, it lacks a unified and scalable evaluation framework, and standard datasets. Besides, there are challenges to be addressed: unverified tool applicability, unexplored impacts of instruction sets and compilation optimizations, and insufficient empirical data on cryptographic implementations. To this end, this study proposes a modular framework for IoT firmware cryptographic algorithm identification, which supports plug-and-play integration of tools via standardized interfaces, a three-dimensional evaluation metric (algorithm types, function counts, constant quantities) and a standardized test dataset covering seven cryptographic libraries, six instruction set architectures, and four compilation optimization levels. Through four experimental studies including tool performance comparison, compilation optimization impact analysis, architecture difference evaluation, and real-world firmware cryptographic usage investigation, it demonstrates that constant-based identification techniques achieve optimal performance in IoT scenarios while revealing the impact mechanisms of ISA architectures and compilation optimizations on identification effectiveness. It also provides methodological guidance and empirical data foundations for IoT firmware cryptographic algorithm identification studies in the future.
IoT firmware / cryptographic misuse / static analysis / cryptographic algorithm identification
| [1] |
|
| [2] |
|
| [3] |
|
| [4] |
|
| [5] |
Radhika K, Verma S, Sathya R, Kathirvel T, Vishnu K H, Rajan N M. AI powered crypt-analysis for identification of encryption algorithm. In: Proceedings of the 4th International Conference on Sustainable Expert Systems. 2024, 1880–1884 |
| [6] |
|
| [7] |
|
| [8] |
|
| [9] |
|
| [10] |
|
| [11] |
Matenaar F, Wichmann A, Leder F, Gerhards-Padilla E. CIS: the crypto intelligence system for automatic detection and localization of cryptographic functions in current malware. In: Proceedings of the 7th International Conference on Malicious and Unwanted Software. 2012, 46–53 |
| [12] |
|
| [13] |
|
| [14] |
|
| [15] |
|
| [16] |
|
| [17] |
|
| [18] |
|
| [19] |
|
| [20] |
|
| [21] |
|
| [22] |
|
| [23] |
|
| [24] |
|
| [25] |
|
| [26] |
|
| [27] |
|
| [28] |
|
| [29] |
|
| [30] |
|
| [31] |
|
| [32] |
|
| [33] |
|
| [34] |
|
| [35] |
|
| [36] |
|
| [37] |
|
| [38] |
|
| [39] |
|
| [40] |
|
| [41] |
Ithape S, B R P. Identification of encryption method for block ciphers using machine learning methods. In: Proceedings of the 20th IEEE India Council International Conference. 2023, 1228–1233 |
| [42] |
|
| [43] |
|
| [44] |
|
| [45] |
|
| [46] |
|
| [47] |
|
| [48] |
|
| [49] |
|
Higher Education Press
/
| 〈 |
|
〉 |