Главная
Study mode:
on
1
Intro
2
Firmware Analysis Challenges
3
Existing Analyses
4
Single Binary Analysis
5
Inter-Process Communication
6
Toward Multi-Binary Analysis
7
Karonte Overview
8
Unpacking
9
Border Binary Discovery
10
Parsing Score
11
Clustering
12
Binary Dependency Graph
13
BDG Algorithm
14
Multi-Binary Data-Flow Analysis
15
Insecure Interactions Detection
16
Static Taint Engine
17
Evaluation: Large Scale
18
Karonte Performance
Description:
Explore KARONTE, a novel approach for detecting insecure multi-binary interactions in embedded firmware, in this 16-minute IEEE conference talk. Delve into the challenges of firmware analysis, existing single-binary analyses, and the complexities of inter-process communication. Learn about Karonte's innovative multi-binary analysis technique, including its unpacking process, border binary discovery, parsing score, clustering, and binary dependency graph algorithm. Examine the static taint engine used for insecure interaction detection and evaluate Karonte's performance in large-scale scenarios. Gain insights from researchers at the University of California, Santa Barbara and Arizona State University as they present their groundbreaking work in improving embedded device security.

KARONTE - Detecting Insecure Multi-Binary Interactions in Embedded Firmware

IEEE
Add to list
0:00 / 0:00