Главная
Study mode:
on
1
Introduction
2
Why should we analyze firmware
3
Common vulnerabilities
4
Protection mechanisms
5
Firmwares challenges
6
Dynamic analysis
7
Dynamic analysis limitations
8
Static analysis
9
Firmware is mostly multibinary
10
Binary architecture
11
Example
12
Research Background
13
Canon Architecture
14
Firmware Packing
15
Border Binary
16
Parsing Score
17
Binary Dependency Graph
18
Semantic CPF
19
The Problem
20
Insecure Interaction Detection
21
Data Analysis
22
Intention
23
Team dependencies
24
Evaluation
25
Experiments
26
Evaluation Results
27
Evaluation Results Summary
28
GitHub
29
Conclusion
Description:
Explore the critical issue of multi-binary vulnerabilities in embedded firmware through this 33-minute Black Hat conference talk. Delve into the challenges posed by low-power, single-purpose embedded devices like routers and IoT devices, and their potential threat to Internet infrastructure. Examine common vulnerabilities, protection mechanisms, and the limitations of dynamic analysis in firmware security. Gain insights into static analysis techniques, focusing on the complexities of multi-binary firmware and binary architecture. Learn about the Canon Architecture, firmware packing, and the concept of Border Binary. Understand the importance of parsing scores, binary dependency graphs, and semantic CPF in vulnerability detection. Discover methods for identifying insecure interactions and analyzing data within firmware. Review evaluation results and access the GitHub repository for further exploration. Enhance your knowledge of embedded firmware security and its implications for the broader Internet ecosystem. Read more

Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale

Black Hat
Add to list
0:00 / 0:00