싱크 확장을 위한 패턴 기반의 임베디드 바이너리 취약점 분석 기법

Vol. 34, No. 6, pp. 1251-1262, 12월. 2024
10.13089/JKIISC.2024.34.6.1251, Full Text:
Keywords: Firmware Analysis, Static Analysis, vulnerability research
Abstract

With the recent proliferation of IoT devices, the importance of vulnerability analysis for embedded firmware binaries has grown. While current static analysis techniques effectively detect various vulnerabilities, they primarily focus on identifying vulnerabilities through the names of sink functions. This approach has limitations, as it fails to detect sink function-independent vulnerabilities, such as buffer overflows caused by buffer access patterns rather than library functions. Therefore, this study proposes a pattern-based vulnerability analysis method that addresses these limitations by defining sinks using code patterns and performing restricted dependency analysis within these patterns. By relying on code patterns rather than sink functions, this approach can identify new types of vulnerabilities. This study particularly focuses on loop patterns. Experimental results demonstrate that the pattern-based analysis method can successfully infer memory increments within loops and detect vulnerabilities that existing static analysis techniques cannot identify. This method is easily extendable by adding new patterns, suggesting potential for more comprehensive vulnerability detection in the future.

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
김태호 and 신영주, "Pattern-Based Vulnerability Analysis Technique for Embedded Binaries to Expand Sink," Journal of The Korea Institute of Information Security and Cryptology, vol. 34, no. 6, pp. 1251-1262, 2024. DOI: 10.13089/JKIISC.2024.34.6.1251.

[ACM Style]
김태호 and 신영주. 2024. Pattern-Based Vulnerability Analysis Technique for Embedded Binaries to Expand Sink. Journal of The Korea Institute of Information Security and Cryptology, 34, 6, (2024), 1251-1262. DOI: 10.13089/JKIISC.2024.34.6.1251.