cwe_checker: Hunting Binary Code Vulnerabilities Across CPU Architectures
Action | Key |
---|---|
Play / Pause | K or space |
Mute / Unmute | M |
Toggle fullscreen mode | F |
Select next subtitles | C |
Select next audio track | A |
Toggle automatic slides maximization | V |
Seek 5s backward | left arrow |
Seek 5s forward | right arrow |
Seek 10s backward | shift + left arrow or J |
Seek 10s forward | shift + right arrow or L |
Seek 60s backward | control + left arrow |
Seek 60s forward | control + right arrow |
Seek 1 frame backward | alt + left arrow |
Seek 1 frame forward | alt + right arrow |
Decrease volume | shift + down arrow |
Increase volume | shift + up arrow |
Decrease playback rate | < |
Increase playback rate | > |
Seek to end | end |
Seek to beginning | beginning |
Share this media
HLS video stream
You can use an external player to play this stream (like VLC).
HLS video streamWhen subscribed to notifications, an email will be sent to you for all added annotations.
Your user account has no email address.
Information on this media
The security assessment of closed source IoT software is a tedious and time-consuming task. First, we are facing a multitude of CPU architectures. Second, security experts are a scarce resource. Therefore, it is desirable to keep the expert as much as possible out of the loop and automate as much as possible. Unfortunately, there is a lack of publicly available binary code scanners that are CPU architecture agnostic.
To the best of our knowledge, we present the first publicly available vulnerability scanner for binary code that is CPU architecture agnostic. In this talk, we introduce the static analysis tool cwe_checker, which is build upon the Binary Analysis Platform (BAP). It focuses on security vulnerabilities in ordinary software and firmware. cwe_checker heuristically detects several bug classes, commonly known as Common Weakness Enumerations (CWEs). By using an intermediate representation of the binary code, it supports many CPU architectures such as ARM, MIPS, PPC, and x86/x64. cwe_checker’s results can be exported to IDA Pro for convenient manual assessment of potential bugs.
This is the first public presentation of this open source project. We introduce cwe_checker’s architecture and general features. Afterwards, we demonstrate the tool with several use cases from the realm of IoT.
Speakers
Thomas Barabosch (Fraunhofer FKIE), Nils-Edvin Enkelmann (Fraunhofer FKIE)
Bio
Thomas holds a PhD in computer science. His research interests include malware analysis, firmware analysis, and bug hunting. Throughout the last years he has found numerous vulnerabilities in low-level software including FreeBSD, OpenBSD, and Virtualbox. He has presented at many scientific as well as non-scientific conferences like Black Hat Europe, Botconf, FOSDEM, and RAID.
Nils is a software security enthusiast who recently turned his hobby into his job.
Other media in the channel "2019"
989 views, 2 this yearPatrOwl - Orchestrating SecOps with an open-source SOAR platformJuly 3rd, 2019
141 views, 4 this year, 1 this monthBetter curl !July 3rd, 2019
118 views, 5 this year, 2 this monthManaging a growing fleet of WiFi routers combining OpenWRT, WireGuard, Salt and ZabbixJuly 3rd, 2019
33 viewsNo IT security without Free SoftwareJuly 3rd, 2019
34 viewsD4 Project - Design and Implementation of an Open Source Distributed and Collaborative Security MonitoringJuly 3rd, 2019
15 viewsProgramming research, a missed opportunity for secure and libre software?July 3rd, 2019