Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

KARONTE - Detecting Insecure Multi-Binary Interactions in Embedded Firmware

IEEE via YouTube

Overview

Explore KARONTE, a novel approach for detecting insecure multi-binary interactions in embedded firmware, in this 16-minute IEEE conference talk. Delve into the challenges of firmware analysis, existing single-binary analyses, and the complexities of inter-process communication. Learn about Karonte's innovative multi-binary analysis technique, including its unpacking process, border binary discovery, parsing score, clustering, and binary dependency graph algorithm. Examine the static taint engine used for insecure interaction detection and evaluate Karonte's performance in large-scale scenarios. Gain insights from researchers at the University of California, Santa Barbara and Arizona State University as they present their groundbreaking work in improving embedded device security.

Syllabus

Intro
Firmware Analysis Challenges
Existing Analyses
Single Binary Analysis
Inter-Process Communication
Toward Multi-Binary Analysis
Karonte Overview
Unpacking
Border Binary Discovery
Parsing Score
Clustering
Binary Dependency Graph
BDG Algorithm
Multi-Binary Data-Flow Analysis
Insecure Interactions Detection
Static Taint Engine
Evaluation: Large Scale
Karonte Performance

Taught by

IEEE Symposium on Security and Privacy

Reviews

Start your review of KARONTE - Detecting Insecure Multi-Binary Interactions in Embedded Firmware

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.