Cross-architecture bug search in binary executables
dc.contributor.author | Pewny, Jannik | |
dc.contributor.author | Garmany, Behrad | |
dc.contributor.author | Gawlik, Robert | |
dc.contributor.author | Rossow, Christian | |
dc.contributor.author | Holz, Thorsten | |
dc.date.accessioned | 2018-04-13T09:16:45Z | |
dc.date.available | 2018-04-13T09:16:45Z | |
dc.date.issued | 2017 | |
dc.description.abstract | With the general availability of closed-source software for various CPU architectures, there is a need to identify security-critical vulnerabilities at the binary level. Unfortunately, existing bug finding methods fall short in that they i) require source code, ii) only work on a single architecture (typically x86), or iii) rely on dynamic analysis, which is difficult for embedded devices. In this paper, we propose a system to derive bug signatures for known bugs. First, we compute semantic hashes for the basic blocks of the binary. When can then use these semantics to find code parts in the binary that behave similarly to the bug signature, effectively revealing code parts that contain the bug. As a result, we can find vulnerabilities, e.g., the famous Heartbleed vulnerabilities, in buggy binary code for any of the supported architectures (currently, ARM, MIPS and x86). | en |
dc.identifier.doi | 10.1515/itit-2016-0040 | |
dc.identifier.pissn | 1611-2776 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/16405 | |
dc.language.iso | en | |
dc.publisher | De Gruyter | |
dc.relation.ispartof | it - Information Technology: Vol. 59, No. 5 | |
dc.subject | Binary | |
dc.subject | bug search | |
dc.subject | cross-architecture | |
dc.subject | sampling | |
dc.subject | similarity metric | |
dc.title | Cross-architecture bug search in binary executables | en |
dc.type | Text/Journal Article | |
gi.citation.publisherPlace | Berlin | |
gi.citation.startPage | 83 | |
gi.conference.sessiontitle | Thematic Issue: Vulnerability Analysis |