2017 International Conference on Dependable Systems and Their Applications (DSA) 2017
DOI: 10.1109/dsa.2017.15
|View full text |Cite
|
Sign up to set email alerts
|

CVSSA: Cross-Architecture Vulnerability Search in Firmware Based on Support Vector Machine and Attributed Control Flow Graph

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 17 publications
0
9
0
Order By: Relevance
“…The idea is to use kNN for fast screening out of obvious non-candidates, and then, SVM is only applied to a small number of highly suspected functions. The kNN-SVM-based method can reduce the query time to a few times lower than that of our previous work only applying SVM (Lin et al 2017), e.g., from 0.18 s to 0.032 s in the condition "ARM to MIPS", at the expense of slightly lower correctness, e.g., from 99.7 to 99.6%. The kNN-SVM-based method also outperforms other state-of-the-art approaches, i.e., Multi−MH (Pewny et al 2015), Multi−k−MH (Pewny et al 2015), and discovRE (Eschweiler et al 2016), in terms of overall performance.…”
Section: Introductionmentioning
confidence: 68%
See 1 more Smart Citation
“…The idea is to use kNN for fast screening out of obvious non-candidates, and then, SVM is only applied to a small number of highly suspected functions. The kNN-SVM-based method can reduce the query time to a few times lower than that of our previous work only applying SVM (Lin et al 2017), e.g., from 0.18 s to 0.032 s in the condition "ARM to MIPS", at the expense of slightly lower correctness, e.g., from 99.7 to 99.6%. The kNN-SVM-based method also outperforms other state-of-the-art approaches, i.e., Multi−MH (Pewny et al 2015), Multi−k−MH (Pewny et al 2015), and discovRE (Eschweiler et al 2016), in terms of overall performance.…”
Section: Introductionmentioning
confidence: 68%
“…This paper is a significant extension of the conference paper published at DSA 2017 (Lin et al 2017). On the basis of the original paper, we further propose a hybrid method using a kNN-SVM approach to improve the efficiency considerably at an acceptable or negligible cost of accuracy.…”
Section: Introductionmentioning
confidence: 88%
“…There is a wide range of operating systems used in embedded devices, ranging from more complex ones like Linux to less complex ones like eCos. The most common operating systems used by IoT devices are Linux 20 , VxWorks 21 , eCos 22 , OpenWRT 23 , Junos OS 24 and uCOS 25 . Like the bootloader, the operating system might also contain security holes, but finding these are not trivial either.…”
Section: Firmware Extractionmentioning
confidence: 99%
“…In order to perform efficient searches, similarity metrics and bug patterns are required. Similarity metrics often include structural features [20], [21], [22], [23] such as the number of instructions, string and numeric constants or the structure of the control flow graph (CFG). However, such metrics face challenges when vulnerable components must be matched in a cross-platform manner.…”
Section: Finding Potentially Vulnerable Componentsmentioning
confidence: 99%
See 1 more Smart Citation