Logo des Repositoriums
 

Cross-architecture bug search in binary executables

dc.contributor.authorPewny, Jannik
dc.contributor.authorGarmany, Behrad
dc.contributor.authorGawlik, Robert
dc.contributor.authorRossow, Christian
dc.contributor.authorHolz, Thorsten
dc.date.accessioned2018-04-13T09:16:45Z
dc.date.available2018-04-13T09:16:45Z
dc.date.issued2017
dc.description.abstractWith the general availability of closed-source software for various CPU architectures, there is a need to identify security-critical vulnerabilities at the binary level. Unfortunately, existing bug finding methods fall short in that they i) require source code, ii) only work on a single architecture (typically x86), or iii) rely on dynamic analysis, which is difficult for embedded devices. In this paper, we propose a system to derive bug signatures for known bugs. First, we compute semantic hashes for the basic blocks of the binary. When can then use these semantics to find code parts in the binary that behave similarly to the bug signature, effectively revealing code parts that contain the bug. As a result, we can find vulnerabilities, e.g., the famous Heartbleed vulnerabilities, in buggy binary code for any of the supported architectures (currently, ARM, MIPS and x86).en
dc.identifier.doi10.1515/itit-2016-0040
dc.identifier.pissn1611-2776
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/16405
dc.language.isoen
dc.publisherDe Gruyter
dc.relation.ispartofit - Information Technology: Vol. 59, No. 5
dc.subject Binary
dc.subject bug search
dc.subject cross-architecture
dc.subject sampling
dc.subject similarity metric
dc.titleCross-architecture bug search in binary executablesen
dc.typeText/Journal Article
gi.citation.publisherPlaceBerlin
gi.citation.startPage83
gi.conference.sessiontitleThematic Issue: Vulnerability Analysis

Dateien