2021
DOI: 10.1007/s13369-021-06342-8
|View full text |Cite
|
Sign up to set email alerts
|

A Heuristic Local-sensitive Program-Wide Diffing Method for IoT Binary Files

Abstract: Code reuse brings vulnerabilities in third-party library to many Internet of Things (IoT) devices, opening them to attacks such as distributed denial of service. Program-wide binary diffing technology can help detect these vulnerabilities in IoT devices whose source codes are not public. Considering the architectures of IoT devices may vary, we propose a data-aware program-wide diffing method across architectures and optimization levels. We rely on the defined anchor functions and call relationship to expand t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

1
19
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(20 citation statements)
references
References 40 publications
(43 reference statements)
1
19
0
Order By: Relevance
“…In today's computing environment, encountering binary-only software is common including commodity or proprietary programs, system software like firmware and device drivers. Accordingly, binary analysis is essential in implementing a wide range of popular use cases [11,13,21,65]: e.g., detecting code clone or software plagiarism to protect against intellectual property infringement [17,40,67], discovering vulnerabilities in distributed software [7,8,14,15,19,38,42,51,52,57,58], detecting [5,6,35] and classifying [28,34] malware, and analyzing program repairs or patches [20,29,64], and establishing toolchain provenance [48,56] for digital forensics purposes.…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…In today's computing environment, encountering binary-only software is common including commodity or proprietary programs, system software like firmware and device drivers. Accordingly, binary analysis is essential in implementing a wide range of popular use cases [11,13,21,65]: e.g., detecting code clone or software plagiarism to protect against intellectual property infringement [17,40,67], discovering vulnerabilities in distributed software [7,8,14,15,19,38,42,51,52,57,58], detecting [5,6,35] and classifying [28,34] malware, and analyzing program repairs or patches [20,29,64], and establishing toolchain provenance [48,56] for digital forensics purposes.…”
Section: Introductionmentioning
confidence: 99%
“…Besides, code generation is impacted by other major factors such as an architecture, compiler, compiler version, compiler option, and code obfuscation. [67] from our evaluation dataset (section VI). The function mismatch represents basic block pairs with a sequence of identical instructions that do not belong to the same function.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations