当前位置: X-MOL 学术Comput. Commun. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Osprey: A fast and accurate patch presence test framework for binaries
Computer Communications ( IF 4.5 ) Pub Date : 2021-03-20 , DOI: 10.1016/j.comcom.2021.03.011
Peiyuan Sun , Qiben Yan , Haoyi Zhou , Jianxin Li

With the rapid development of Internet of Things (IoT), a new paradigm named Mobile Edge Computing (MEC) is proposed to push the cloud computing to the edge devices. However the rapid growth of Internet-of-Things (IoT) and its inadvertent incorporation of vulnerable third-party code have created a massive amount of vulnerable IoT devices. Even worse, the majority of vulnerable devices are left unpatched due to the lack of easy upgrade routine and automated patch management. Thus, it is crucial to test the patch presence in IoT devices rapidly and accurately, for both defenders and attackers. In this paper, we present Osprey, a fast and accurate patch presence test framework for automatically identifying security patches in a firmware. Osprey identifies fine-grain semantic binary changes introduced by the patch in the binary by analyzing data flow slices across the basic blocks. It parses and analyzes these binary changes to extract patch signatures, which incorporate representative operators and the origins of operands. Then, patch presence can be identified by matching patch signatures through lexical comparison. Compared with the state-of-the-art patch presence test approach, Osprey extracts precise patch semantic information from data flow without expensive symbolic execution. We implement and evaluate Osprey against 45 patches and 8 versions of OpenSSL project, and the results show that Osprey is able to perform patch presence test 9.6 times faster than the state-of-the-art approach with high precision that exceeds 90%.



中文翻译:

Osprey:一种快速且准确的二进制文件补丁存在测试框架

随着物联网(IoT)的飞速发展,提出了一种名为移动边缘计算(MEC)的新范例,以将云计算推向边缘设备。但是,物联网(IoT)的快速增长及其对易受攻击的第三方代码的无意合并已创建了大量易受攻击的IoT设备。更糟糕的是,由于缺乏易于升级的例行程序和自动补丁管理,大多数易受攻击的设备都无法打补丁。因此,对于防御者和攻击者而言,快速准确地测试IoT设备中补丁的存在至关重要。在本文中,我们介绍了Osprey,这是一种快速准确的补丁存在测试框架,用于自动识别固件中的安全补丁。Osprey通过分析跨基本块的数据流切片来识别补丁程序在二进制文件中引入的细粒度语义二进制更改。它解析并分析这些二进制更改,以提取补丁签名,其中包含代表性的运算符和操作数的来源。然后,可以通过词法比较匹配补丁签名来识别补丁存在。与最新的修补程序存在测试方法相比,Osprey从数据流中提取了精确的修补程序语义信息,而无需执行昂贵的符号执行。我们针对45个补丁程序和8个版本的OpenSSL项目实施并评估了Osprey,结果表明,Osprey能够比最先进的方法以超过90%的高精度执行补丁存在测试的速度快9.6倍。它解析并分析这些二进制更改,以提取补丁签名,其中包含代表性的运算符和操作数的来源。然后,可以通过词法比较匹配补丁签名来识别补丁存在。与最新的修补程序存在测试方法相比,Osprey从数据流中提取了精确的修补程序语义信息,而无需执行昂贵的符号执行。我们针对45个补丁程序和8个版本的OpenSSL项目实施并评估了Osprey,结果表明,Osprey能够比最先进的方法以超过90%的高精度执行补丁存在测试的速度快9.6倍。它解析并分析这些二进制更改,以提取补丁签名,其中包含代表性的运算符和操作数的来源。然后,可以通过词法比较匹配补丁签名来识别补丁存在。与最新的修补程序存在测试方法相比,Osprey从数据流中提取了精确的修补程序语义信息,而无需执行昂贵的符号执行。我们针对45个补丁程序和8个版本的OpenSSL项目实施并评估了Osprey,结果表明,Osprey能够比最先进的方法以超过90%的高精度执行补丁存在测试的速度快9.6倍。可以通过词汇比较匹配补丁签名来识别补丁的存在。与最新的补丁存在测试方法相比,Osprey从数据流中提取了精确的补丁语义信息,而无需执行昂贵的符号执行。我们针对45个补丁程序和8个版本的OpenSSL项目实施并评估了Osprey,结果表明,Osprey能够比最先进的方法以超过90%的高精度执行补丁存在测试的速度快9.6倍。可以通过词汇比较匹配补丁签名来识别补丁的存在。与最新的修补程序存在测试方法相比,Osprey从数据流中提取了精确的修补程序语义信息,而无需执行昂贵的符号执行。我们针对45个补丁程序和8个版本的OpenSSL项目实施并评估了Osprey,结果表明,Osprey能够比最先进的方法以超过90%的高精度执行补丁存在测试的速度快9.6倍。

更新日期:2021-04-13
down
wechat
bug