二进制代码相似度分析技术及其在嵌入式设备固件漏洞搜索中的应用研究
作者:
作者单位:

作者简介:

通讯作者:

甘水滔,E-mail:ganshuitao@gmail.com

中图分类号:

TP311

基金项目:


Research on the Technologies of Binary Code Similarity Analysis and their applications on the Embedded Device Firmware Vulnerability Search
Author:
Affiliation:

Fund Project:

  • 摘要
  • |
  • 图/表
  • |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • |
  • 引证文献
  • |
  • 资源附件
  • |
  • 文章评论
    摘要:

    在当今“万物互联”的时代,嵌入式系统逐渐成为接入云端的重要组件,常用于安全和隐私敏感的应用或设备中。然而,其底层软件(即固件)也在频繁遭受着安全漏洞的影响。由于嵌入式设备底层硬件平台的复杂异构,软硬件实现差异较大,且其专用性强、源码/文档等往往不会公开,加之其运行环境受限等原因,使得一些在桌面系统上运行良好的动态测试工具很难(或根本不可能)直接适配到嵌入式设备/固件环境中。近年来,研究人员逐渐开始探索基于二进制相似度分析技术来检测嵌入式设备固件中存在的已知漏洞,并且取得了较大的进展。本文围绕二进制代码相似度分析面临的关键技术挑战,系统研究了现有的二进制代码相似度分析技术,对其通用流程、技术特征、评估标准进行了综合分析和比较;然后分析并总结了现有二进制代码相似度分析技术在嵌入式设备固件漏洞搜索领域的应用;最后,提出了该领域应用仍然存在的一些技术挑战及未来的一些开放性的研究方向。

    Abstract:

    In the era of today’s Internet of Things, embedded systems are becoming important components for accessing the cloud, which are used in both secure and privacy-sensitive applications or devices frequently. However, the underlying software (a.k.a. firmware) often suffered from a wide range of security vulnerabilities. The complexity and heterogeneous of the underlying hardware platform, the difference of the hardware and software implementation, the specificity and limited document, together with limited running environment made some of very good dynamic testing tools for desktop systems hard to (even impossible) be adapted to embedded devices/firmware environment directly. In recent years, researchers have made great progress in detecting well-known vulnerabilities in embedded device firmware based on binary code similarity analysis. Focusing on the key technical challenges of binary code similarity analysis, we studied the existing binary code similarity analysis technologies systematically, analyzed and compared the general process, technical characteristics and evaluation criteria of these technologies comprehensively. Then we analyzed and summarized the application of these technologies in the field of the embedded device firmware vulnerability search. At the end, we presented some technical challenges in this field and proposed some open future research directions for the related researchers.

    参考文献
    相似文献
    引证文献
引用本文

于颖超,甘水滔,邱俊洋,秦晓军,陈左宁.二进制代码相似度分析技术及其在嵌入式设备固件漏洞搜索中的应用研究.软件学报,,():0

复制
分享
文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:2021-03-29
  • 最后修改日期:2021-08-21
  • 录用日期:
  • 在线发布日期: 2021-12-24
  • 出版日期:
您是第位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号