Главная
Study mode:
on
1
Intro
2
Finding vulnerabilities in loT devices is more crucial than ever!
3
Search for known vulnerabilities
4
Pair-wise graph matching is expensive!
5
A similar problem
6
We don't compare images one by one
7
Our approach
8
Raw feature extraction
9
Feature learning
10
High-level feature encoding
11
Evaluating
12
Evaluation: Datasets
13
Evaluation: Baseline Comparison
14
Evaluation: True Positive Rate
15
Evaluation: ROC curves
16
Evaluation: Search Efficiency
17
Evaluation: Search Scalability
18
Evaluation: Preparation Time
19
Evaluation: Compare with Multi-MH/Multi-k-MH
20
Evaluation: Case Study II
21
Conclusion
Description:
Explore a conference talk from CCS 2016 that presents a scalable graph-based approach for bug searching in firmware images. Learn about the challenges of finding vulnerabilities in IoT devices and the innovative solution proposed by researchers from Syracuse University. Discover how raw feature extraction, feature learning, and high-level feature encoding contribute to efficient bug detection. Examine the evaluation process, including datasets, baseline comparisons, true positive rates, ROC curves, search efficiency, and scalability. Gain insights into the preparation time and comparative analysis with other methods. Conclude with a case study that demonstrates the practical application of this cutting-edge technique in enhancing IoT device security.

Scalable Graph-based Bug Search for Firmware Images

Association for Computing Machinery (ACM)
Add to list
0:00 / 0:00