协助软件可执行文件向后量子加密技术迁移的工具链

Norrathep Rattanavipanon, Jakapan Suaboot, Warodom Werapun
{"title":"协助软件可执行文件向后量子加密技术迁移的工具链","authors":"Norrathep Rattanavipanon, Jakapan Suaboot, Warodom Werapun","doi":"arxiv-2409.07852","DOIUrl":null,"url":null,"abstract":"Quantum computing poses a significant global threat to today's security\nmechanisms. As a result, security experts and public sectors have issued\nguidelines to help organizations migrate their software to post-quantum\ncryptography (PQC). Despite these efforts, there is a lack of (semi-)automatic\ntools to support this transition especially when software is used and deployed\nas binary executables. To address this gap, in this work, we first propose a\nset of requirements necessary for a tool to detect quantum-vulnerable software\nexecutables. Following these requirements, we introduce QED: a toolchain for\nQuantum-vulnerable Executable Detection. QED uses a three-phase approach to\nidentify quantum-vulnerable dependencies in a given set of executables, from\nfile-level to API-level, and finally, precise identification of a static trace\nthat triggers a quantum-vulnerable API. We evaluate QED on both a synthetic\ndataset with four cryptography libraries and a real-world dataset with over 200\nsoftware executables. The results demonstrate that: (1) QED discerns\nquantum-vulnerable from quantum-safe executables with 100% accuracy in the\nsynthetic dataset; (2) QED is practical and scalable, completing analyses on\naverage in less than 4 seconds per real-world executable; and (3) QED reduces\nthe manual workload required by analysts to identify quantum-vulnerable\nexecutables in the real-world dataset by more than 90%. We hope that QED can\nbecome a crucial tool to facilitate the transition to PQC, particularly for\nsmall and medium-sized businesses with limited resources.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"8 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Toolchain for Assisting Migration of Software Executables Towards Post-Quantum Crytography\",\"authors\":\"Norrathep Rattanavipanon, Jakapan Suaboot, Warodom Werapun\",\"doi\":\"arxiv-2409.07852\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Quantum computing poses a significant global threat to today's security\\nmechanisms. As a result, security experts and public sectors have issued\\nguidelines to help organizations migrate their software to post-quantum\\ncryptography (PQC). Despite these efforts, there is a lack of (semi-)automatic\\ntools to support this transition especially when software is used and deployed\\nas binary executables. To address this gap, in this work, we first propose a\\nset of requirements necessary for a tool to detect quantum-vulnerable software\\nexecutables. Following these requirements, we introduce QED: a toolchain for\\nQuantum-vulnerable Executable Detection. QED uses a three-phase approach to\\nidentify quantum-vulnerable dependencies in a given set of executables, from\\nfile-level to API-level, and finally, precise identification of a static trace\\nthat triggers a quantum-vulnerable API. We evaluate QED on both a synthetic\\ndataset with four cryptography libraries and a real-world dataset with over 200\\nsoftware executables. The results demonstrate that: (1) QED discerns\\nquantum-vulnerable from quantum-safe executables with 100% accuracy in the\\nsynthetic dataset; (2) QED is practical and scalable, completing analyses on\\naverage in less than 4 seconds per real-world executable; and (3) QED reduces\\nthe manual workload required by analysts to identify quantum-vulnerable\\nexecutables in the real-world dataset by more than 90%. We hope that QED can\\nbecome a crucial tool to facilitate the transition to PQC, particularly for\\nsmall and medium-sized businesses with limited resources.\",\"PeriodicalId\":501332,\"journal\":{\"name\":\"arXiv - CS - Cryptography and Security\",\"volume\":\"8 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-09-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"arXiv - CS - Cryptography and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/arxiv-2409.07852\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Cryptography and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2409.07852","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

量子计算对当今的安全机制构成了重大的全球性威胁。因此,安全专家和公共部门发布了指导方针,帮助企业将其软件迁移到后量子加密技术(PQC)。尽管做出了这些努力,但仍缺乏(半)自动工具来支持这一过渡,尤其是在软件作为二进制可执行文件使用和部署时。为了填补这一空白,我们首先提出了检测量子漏洞软件可执行文件的工具所需的一系列要求。根据这些要求,我们介绍了 QED:量子漏洞可执行文件检测工具链。QED 采用三阶段方法识别给定可执行文件集中的量子漏洞依赖关系,从文件级到 API 级,最后精确识别触发量子漏洞 API 的静态轨迹。我们在包含四个密码学库的合成数据集和包含 200 多个软件可执行文件的真实世界数据集上对 QED 进行了评估。结果表明(1) 在合成数据集中,QED 从量子安全的可执行文件中识别量子漏洞的准确率达到 100%;(2) QED 实用且可扩展,平均每个真实世界可执行文件只需不到 4 秒就能完成分析;(3) QED 将分析师识别真实世界数据集中量子漏洞可执行文件所需的人工工作量减少了 90% 以上。我们希望 QED 能够成为促进向 PQC 过渡的重要工具,尤其是对资源有限的中小型企业而言。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Toolchain for Assisting Migration of Software Executables Towards Post-Quantum Crytography
Quantum computing poses a significant global threat to today's security mechanisms. As a result, security experts and public sectors have issued guidelines to help organizations migrate their software to post-quantum cryptography (PQC). Despite these efforts, there is a lack of (semi-)automatic tools to support this transition especially when software is used and deployed as binary executables. To address this gap, in this work, we first propose a set of requirements necessary for a tool to detect quantum-vulnerable software executables. Following these requirements, we introduce QED: a toolchain for Quantum-vulnerable Executable Detection. QED uses a three-phase approach to identify quantum-vulnerable dependencies in a given set of executables, from file-level to API-level, and finally, precise identification of a static trace that triggers a quantum-vulnerable API. We evaluate QED on both a synthetic dataset with four cryptography libraries and a real-world dataset with over 200 software executables. The results demonstrate that: (1) QED discerns quantum-vulnerable from quantum-safe executables with 100% accuracy in the synthetic dataset; (2) QED is practical and scalable, completing analyses on average in less than 4 seconds per real-world executable; and (3) QED reduces the manual workload required by analysts to identify quantum-vulnerable executables in the real-world dataset by more than 90%. We hope that QED can become a crucial tool to facilitate the transition to PQC, particularly for small and medium-sized businesses with limited resources.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信