Overview
Explore KARONTE, a novel approach for detecting insecure multi-binary interactions in embedded firmware, in this 16-minute IEEE conference talk. Delve into the challenges of firmware analysis, existing single-binary analyses, and the complexities of inter-process communication. Learn about Karonte's innovative multi-binary analysis technique, including its unpacking process, border binary discovery, parsing score, clustering, and binary dependency graph algorithm. Examine the static taint engine used for insecure interaction detection and evaluate Karonte's performance in large-scale scenarios. Gain insights from researchers at the University of California, Santa Barbara and Arizona State University as they present their groundbreaking work in improving embedded device security.
Syllabus
Intro
Firmware Analysis Challenges
Existing Analyses
Single Binary Analysis
Inter-Process Communication
Toward Multi-Binary Analysis
Karonte Overview
Unpacking
Border Binary Discovery
Parsing Score
Clustering
Binary Dependency Graph
BDG Algorithm
Multi-Binary Data-Flow Analysis
Insecure Interactions Detection
Static Taint Engine
Evaluation: Large Scale
Karonte Performance
Taught by
IEEE Symposium on Security and Privacy