cwe_checker: Hunting Binary Code Vulnerabilities Across CPU Architectures
Key | Action |
---|---|
K or space | Play / Pause |
M | Mute / Unmute |
C | Select next subtitles |
A | Select next audio track |
V | Show slide in full page or toggle automatic source change |
left arrow | Seek 5s backward |
right arrow | Seek 5s forward |
shift + left arrow or J | Seek 10s backward |
shift + right arrow or L | Seek 10s forward |
control + left arrow | Seek 60s backward |
control + right arrow | Seek 60s forward |
shift + down arrow | Decrease volume |
shift + up arrow | Increase volume |
shift + comma | Decrease playback rate |
shift + dot or shift + semicolon | Increase playback rate |
end | Seek to end |
beginning | Seek to beginning |
Share this media
HLS video stream
You can use an external player to play this stream (like VLC).
HLS video streamWhen subscribed to notifications, an email will be sent to you for all added annotations.
Your user account has no email address.
Information on this media
Links:
Number of views:
97Creation date:
July 1, 2019Speakers:
Thomas BaraboschCompany:
Fraunhofer FKIELicense:
CC BY-SA v4Description
The security assessment of closed source IoT software is a tedious and time-consuming task. First, we are facing a multitude of CPU architectures. Second, security experts are a scarce resource. Therefore, it is desirable to keep the expert as much as possible out of the loop and automate as much as possible. Unfortunately, there is a lack of publicly available binary code scanners that are CPU architecture agnostic.
To the best of our knowledge, we present the first publicly available vulnerability scanner for binary code that is CPU architecture agnostic. In this talk, we introduce the static analysis tool cwe_checker, which is build upon the Binary Analysis Platform (BAP). It focuses on security vulnerabilities in ordinary software and firmware. cwe_checker heuristically detects several bug classes, commonly known as Common Weakness Enumerations (CWEs). By using an intermediate representation of the binary code, it supports many CPU architectures such as ARM, MIPS, PPC, and x86/x64. cwe_checker’s results can be exported to IDA Pro for convenient manual assessment of potential bugs.
This is the first public presentation of this open source project. We introduce cwe_checker’s architecture and general features. Afterwards, we demonstrate the tool with several use cases from the realm of IoT.
Speakers
Thomas Barabosch (Fraunhofer FKIE), Nils-Edvin Enkelmann (Fraunhofer FKIE)
Bio
Thomas holds a PhD in computer science. His research interests include malware analysis, firmware analysis, and bug hunting. Throughout the last years he has found numerous vulnerabilities in low-level software including FreeBSD, OpenBSD, and Virtualbox. He has presented at many scientific as well as non-scientific conferences like Black Hat Europe, Botconf, FOSDEM, and RAID.
Nils is a software security enthusiast who recently turned his hobby into his job.
Other media in the channel "2019"
- 984 views, 15 this yearPatrOwl - Orchestrating SecOps with an open-source SOAR platformJuly 3rd, 2019
- 137 views, 2 this year, 1 this monthBetter curl !July 3rd, 2019
- 110 views, 27 this year, 2 this monthManaging a growing fleet of WiFi routers combining OpenWRT, WireGuard, Salt and ZabbixJuly 3rd, 2019
- 33 views, 1 this yearNo IT security without Free SoftwareJuly 3rd, 2019
- 33 viewsD4 Project - Design and Implementation of an Open Source Distributed and Collaborative Security MonitoringJuly 3rd, 2019
- 15 viewsProgramming research, a missed opportunity for secure and libre software?July 3rd, 2019