Mushuai Han, Dongdong Zhao, Hong Lin, D. Zhou, Jianwen Xiang, Zhongjin Liu, Yanzhen Xing
{"title":"基于VSkLCG的固件跨平台漏洞搜索方法","authors":"Mushuai Han, Dongdong Zhao, Hong Lin, D. Zhou, Jianwen Xiang, Zhongjin Liu, Yanzhen Xing","doi":"10.1109/DSA.2019.00061","DOIUrl":null,"url":null,"abstract":"Vulnerabilities in firmware will make a system at risk. Because of code reuse, the same vulnerability may occur on different platforms. Therefore, searching vulnerabilities across different platforms is of great significance. Due to the difficulty in obtaining the source code of firmware, there is a need to search vulnerabilities at the binary level. However, the prior methods mainly work at the same platform, which can't be directly extended to the case of cross-platform. In this paper, we propose a multistage method to search cross-platform vulnerabilities in firmware. Given a vulnerable function in a platform, our objective is to find its homologous vulnerability in another platform. To ensure the efficiency, we identify a set of robust numeric features and use the k-Nearest Neighbors (kNN) algorithm to obtain possible vulnerable functions. To improve the accuracy, we adopt the bipartite matching algorithm to calculate the distance between functions based on the local call graphs (LCGs) of functions and the call frequency between functions. We have implemented a prototype of our approach, called VSkLCG, which supports three platforms (ARM, MIPS, x86). The experimental results show that our method can search some vulnerabilities in firmware with a high accuracy while maintaining efficiency.","PeriodicalId":342719,"journal":{"name":"2019 6th International Conference on Dependable Systems and Their Applications (DSA)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"VSkLCG A Method for Cross-Platform Vulnerability Search in Firmware\",\"authors\":\"Mushuai Han, Dongdong Zhao, Hong Lin, D. Zhou, Jianwen Xiang, Zhongjin Liu, Yanzhen Xing\",\"doi\":\"10.1109/DSA.2019.00061\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Vulnerabilities in firmware will make a system at risk. Because of code reuse, the same vulnerability may occur on different platforms. Therefore, searching vulnerabilities across different platforms is of great significance. Due to the difficulty in obtaining the source code of firmware, there is a need to search vulnerabilities at the binary level. However, the prior methods mainly work at the same platform, which can't be directly extended to the case of cross-platform. In this paper, we propose a multistage method to search cross-platform vulnerabilities in firmware. Given a vulnerable function in a platform, our objective is to find its homologous vulnerability in another platform. To ensure the efficiency, we identify a set of robust numeric features and use the k-Nearest Neighbors (kNN) algorithm to obtain possible vulnerable functions. To improve the accuracy, we adopt the bipartite matching algorithm to calculate the distance between functions based on the local call graphs (LCGs) of functions and the call frequency between functions. We have implemented a prototype of our approach, called VSkLCG, which supports three platforms (ARM, MIPS, x86). The experimental results show that our method can search some vulnerabilities in firmware with a high accuracy while maintaining efficiency.\",\"PeriodicalId\":342719,\"journal\":{\"name\":\"2019 6th International Conference on Dependable Systems and Their Applications (DSA)\",\"volume\":\"21 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 6th International Conference on Dependable Systems and Their Applications (DSA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/DSA.2019.00061\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 6th International Conference on Dependable Systems and Their Applications (DSA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DSA.2019.00061","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
VSkLCG A Method for Cross-Platform Vulnerability Search in Firmware
Vulnerabilities in firmware will make a system at risk. Because of code reuse, the same vulnerability may occur on different platforms. Therefore, searching vulnerabilities across different platforms is of great significance. Due to the difficulty in obtaining the source code of firmware, there is a need to search vulnerabilities at the binary level. However, the prior methods mainly work at the same platform, which can't be directly extended to the case of cross-platform. In this paper, we propose a multistage method to search cross-platform vulnerabilities in firmware. Given a vulnerable function in a platform, our objective is to find its homologous vulnerability in another platform. To ensure the efficiency, we identify a set of robust numeric features and use the k-Nearest Neighbors (kNN) algorithm to obtain possible vulnerable functions. To improve the accuracy, we adopt the bipartite matching algorithm to calculate the distance between functions based on the local call graphs (LCGs) of functions and the call frequency between functions. We have implemented a prototype of our approach, called VSkLCG, which supports three platforms (ARM, MIPS, x86). The experimental results show that our method can search some vulnerabilities in firmware with a high accuracy while maintaining efficiency.