{"title":"协助软件可执行文件向后量子加密技术迁移的工具链","authors":"Norrathep Rattanavipanon, Jakapan Suaboot, Warodom Werapun","doi":"arxiv-2409.07852","DOIUrl":null,"url":null,"abstract":"Quantum computing poses a significant global threat to today's security\nmechanisms. As a result, security experts and public sectors have issued\nguidelines to help organizations migrate their software to post-quantum\ncryptography (PQC). Despite these efforts, there is a lack of (semi-)automatic\ntools to support this transition especially when software is used and deployed\nas binary executables. To address this gap, in this work, we first propose a\nset of requirements necessary for a tool to detect quantum-vulnerable software\nexecutables. Following these requirements, we introduce QED: a toolchain for\nQuantum-vulnerable Executable Detection. QED uses a three-phase approach to\nidentify quantum-vulnerable dependencies in a given set of executables, from\nfile-level to API-level, and finally, precise identification of a static trace\nthat triggers a quantum-vulnerable API. We evaluate QED on both a synthetic\ndataset with four cryptography libraries and a real-world dataset with over 200\nsoftware executables. The results demonstrate that: (1) QED discerns\nquantum-vulnerable from quantum-safe executables with 100% accuracy in the\nsynthetic dataset; (2) QED is practical and scalable, completing analyses on\naverage in less than 4 seconds per real-world executable; and (3) QED reduces\nthe manual workload required by analysts to identify quantum-vulnerable\nexecutables in the real-world dataset by more than 90%. We hope that QED can\nbecome a crucial tool to facilitate the transition to PQC, particularly for\nsmall and medium-sized businesses with limited resources.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"8 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Toolchain for Assisting Migration of Software Executables Towards Post-Quantum Crytography\",\"authors\":\"Norrathep Rattanavipanon, Jakapan Suaboot, Warodom Werapun\",\"doi\":\"arxiv-2409.07852\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Quantum computing poses a significant global threat to today's security\\nmechanisms. As a result, security experts and public sectors have issued\\nguidelines to help organizations migrate their software to post-quantum\\ncryptography (PQC). Despite these efforts, there is a lack of (semi-)automatic\\ntools to support this transition especially when software is used and deployed\\nas binary executables. To address this gap, in this work, we first propose a\\nset of requirements necessary for a tool to detect quantum-vulnerable software\\nexecutables. Following these requirements, we introduce QED: a toolchain for\\nQuantum-vulnerable Executable Detection. QED uses a three-phase approach to\\nidentify quantum-vulnerable dependencies in a given set of executables, from\\nfile-level to API-level, and finally, precise identification of a static trace\\nthat triggers a quantum-vulnerable API. We evaluate QED on both a synthetic\\ndataset with four cryptography libraries and a real-world dataset with over 200\\nsoftware executables. The results demonstrate that: (1) QED discerns\\nquantum-vulnerable from quantum-safe executables with 100% accuracy in the\\nsynthetic dataset; (2) QED is practical and scalable, completing analyses on\\naverage in less than 4 seconds per real-world executable; and (3) QED reduces\\nthe manual workload required by analysts to identify quantum-vulnerable\\nexecutables in the real-world dataset by more than 90%. We hope that QED can\\nbecome a crucial tool to facilitate the transition to PQC, particularly for\\nsmall and medium-sized businesses with limited resources.\",\"PeriodicalId\":501332,\"journal\":{\"name\":\"arXiv - CS - Cryptography and Security\",\"volume\":\"8 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-09-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"arXiv - CS - Cryptography and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/arxiv-2409.07852\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Cryptography and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2409.07852","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
摘要
量子计算对当今的安全机制构成了重大的全球性威胁。因此,安全专家和公共部门发布了指导方针,帮助企业将其软件迁移到后量子加密技术(PQC)。尽管做出了这些努力,但仍缺乏(半)自动工具来支持这一过渡,尤其是在软件作为二进制可执行文件使用和部署时。为了填补这一空白,我们首先提出了检测量子漏洞软件可执行文件的工具所需的一系列要求。根据这些要求,我们介绍了 QED:量子漏洞可执行文件检测工具链。QED 采用三阶段方法识别给定可执行文件集中的量子漏洞依赖关系,从文件级到 API 级,最后精确识别触发量子漏洞 API 的静态轨迹。我们在包含四个密码学库的合成数据集和包含 200 多个软件可执行文件的真实世界数据集上对 QED 进行了评估。结果表明(1) 在合成数据集中,QED 从量子安全的可执行文件中识别量子漏洞的准确率达到 100%;(2) QED 实用且可扩展,平均每个真实世界可执行文件只需不到 4 秒就能完成分析;(3) QED 将分析师识别真实世界数据集中量子漏洞可执行文件所需的人工工作量减少了 90% 以上。我们希望 QED 能够成为促进向 PQC 过渡的重要工具,尤其是对资源有限的中小型企业而言。
A Toolchain for Assisting Migration of Software Executables Towards Post-Quantum Crytography
Quantum computing poses a significant global threat to today's security
mechanisms. As a result, security experts and public sectors have issued
guidelines to help organizations migrate their software to post-quantum
cryptography (PQC). Despite these efforts, there is a lack of (semi-)automatic
tools to support this transition especially when software is used and deployed
as binary executables. To address this gap, in this work, we first propose a
set of requirements necessary for a tool to detect quantum-vulnerable software
executables. Following these requirements, we introduce QED: a toolchain for
Quantum-vulnerable Executable Detection. QED uses a three-phase approach to
identify quantum-vulnerable dependencies in a given set of executables, from
file-level to API-level, and finally, precise identification of a static trace
that triggers a quantum-vulnerable API. We evaluate QED on both a synthetic
dataset with four cryptography libraries and a real-world dataset with over 200
software executables. The results demonstrate that: (1) QED discerns
quantum-vulnerable from quantum-safe executables with 100% accuracy in the
synthetic dataset; (2) QED is practical and scalable, completing analyses on
average in less than 4 seconds per real-world executable; and (3) QED reduces
the manual workload required by analysts to identify quantum-vulnerable
executables in the real-world dataset by more than 90%. We hope that QED can
become a crucial tool to facilitate the transition to PQC, particularly for
small and medium-sized businesses with limited resources.