喵ID:JAey1k免责声明

Rampo: A CEGAR-based Integration of Binary Code Analysis and System Falsification for Cyber-Kinetic Vulnerability Detection

Rampo:基于 CEGAR 的二进制代码分析和系统伪造集成,用于网络动力学漏洞检测

基本信息

DOI:
--
发表时间:
2024
期刊:
arXiv.org
影响因子:
--
通讯作者:
Yasser Shoukry
中科院分区:
文献类型:
--
作者: Kohei Tsujio;M. A. Faruque;Yasser Shoukry研究方向: -- MeSH主题词: --
关键词: --
来源链接:pubmed详情页地址

文献摘要

This paper presents a novel tool, named Rampo, that can perform binary code analysis to identify cyber kinetic vulnerabilities in CPS. The tool takes as input a Signal Temporal Logic (STL) formula that describes the kinetic effect, i.e., the behavior of the physical system, that one wants to avoid. The tool then searches the possible cyber trajectories in the binary code that may lead to such physical behavior. This search integrates binary code analysis tools and hybrid systems falsification tools using a Counter-Example Guided Abstraction Refinement (CEGAR) approach. Rampo starts by analyzing the binary code to extract symbolic constraints that represent the different paths in the code. These symbolic constraints are then passed to a Satisfiability Modulo Theories (SMT) solver to extract the range of control signals that can be produced by each path in the code. The next step is to search over possible physical trajectories using a hybrid systems falsification tool that adheres to the behavior of the cyber paths and yet leads to violations of the STL formula. Since the number of cyber paths that need to be explored increases exponentially with the length of physical trajectories, we iteratively perform refinement of the cyber path constraints based on the previous falsification result and traverse the abstract path tree obtained from the control program to explore the search space of the system. To illustrate the practical utility of binary code analysis in identifying cyber kinetic vulnerabilities, we present case studies from diverse CPS domains, showcasing how they can be discovered in their control programs. Our tool could compute the same number of vulnerabilities while leading to a speedup that ranges from 3x to 98x.
本文介绍了一种名为Rampo的新型工具,它能够进行二进制代码分析,以识别信息物理系统(CPS)中的网络动态漏洞。该工具将描述动态效应(即人们想要避免的物理系统行为)的信号时序逻辑(STL)公式作为输入。然后,该工具在二进制代码中搜索可能导致这种物理行为的网络轨迹。这种搜索使用反例引导的抽象精化(CEGAR)方法集成了二进制代码分析工具和混合系统证伪工具。Rampo首先分析二进制代码以提取代表代码中不同路径的符号约束。然后将这些符号约束传递给可满足性模理论(SMT)求解器,以提取代码中每条路径可能产生的控制信号范围。下一步是使用混合系统证伪工具搜索可能的物理轨迹,该工具遵循网络路径的行为,但会导致违反STL公式。由于需要探索的网络路径数量随着物理轨迹的长度呈指数增长,我们根据先前的证伪结果迭代地对网络路径约束进行精化,并遍历从控制程序获得的抽象路径树以探索系统的搜索空间。为了说明二进制代码分析在识别网络动态漏洞方面的实际效用,我们展示了来自不同CPS领域的案例研究,展示了如何在其控制程序中发现这些漏洞。我们的工具能够计算出相同数量的漏洞,同时速度提高了3倍到98倍。
参考文献(2)
被引文献(0)
SMT-Based Bounded Model Checking for Embedded ANSI-C Software
DOI:
10.1109/ase.2009.63
发表时间:
2009-01-01
期刊:
2009 IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, PROCEEDINGS
影响因子:
0
作者:
Cordeiro, Lucas;Fischer, Bernd;Marques-Silva, Joao
通讯作者:
Marques-Silva, Joao
A Wolf in Sheep's Clothing: Spreading Deadly Pathogens Under the Disguise of Popular Music
DOI:
10.1145/3548606.3560643
发表时间:
2022-10
期刊:
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security
影响因子:
0
作者:
Anomadarshi Barua;Yonatan Gizachew Achamyeleh;M. A. Faruque
通讯作者:
Anomadarshi Barua;Yonatan Gizachew Achamyeleh;M. A. Faruque

数据更新时间:{{ references.updateTime }}

Yasser Shoukry
通讯地址:
--
所属机构:
--
电子邮件地址:
--
免责声明免责声明
1、猫眼课题宝专注于为科研工作者提供省时、高效的文献资源检索和预览服务;
2、网站中的文献信息均来自公开、合规、透明的互联网文献查询网站,可以通过页面中的“来源链接”跳转数据网站。
3、在猫眼课题宝点击“求助全文”按钮,发布文献应助需求时求助者需要支付50喵币作为应助成功后的答谢给应助者,发送到用助者账户中。若文献求助失败支付的50喵币将退还至求助者账户中。所支付的喵币仅作为答谢,而不是作为文献的“购买”费用,平台也不从中收取任何费用,
4、特别提醒用户通过求助获得的文献原文仅用户个人学习使用,不得用于商业用途,否则一切风险由用户本人承担;
5、本平台尊重知识产权,如果权利所有者认为平台内容侵犯了其合法权益,可以通过本平台提供的版权投诉渠道提出投诉。一经核实,我们将立即采取措施删除/下架/断链等措施。
我已知晓