Scalable Graph-based Bug Search for Firmware Images
Association for Computing Machinery (ACM) via YouTube
Overview
Syllabus
Intro
Finding vulnerabilities in loT devices is more crucial than ever!
Search for known vulnerabilities
Pair-wise graph matching is expensive!
A similar problem
We don't compare images one by one
Our approach
Raw feature extraction
Feature learning
High-level feature encoding
Evaluating
Evaluation: Datasets
Evaluation: Baseline Comparison
Evaluation: True Positive Rate
Evaluation: ROC curves
Evaluation: Search Efficiency
Evaluation: Search Scalability
Evaluation: Preparation Time
Evaluation: Compare with Multi-MH/Multi-k-MH
Evaluation: Case Study II
Conclusion
Taught by
ACM CCS