ERS0: Enhancing Military Cybersecurity with AI-Driven SBOM for Firmware Vulnerability Detection and Asset Management

被引:0
作者
Beninger, Max [1 ]
Charland, Philippe [2 ]
Ding, Steven H. H. [3 ]
Fung, Benjamin C. M. [3 ]
机构
[1] Queens Univ, Sch Comp, Kingston, ON, Canada
[2] Def Res & Dev, Mission Crit Cyber Secur Sect, Quebec City, PQ, Canada
[3] McGill Univ, Sch Informat Studies, Montreal, PQ, Canada
来源
2024 16TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT: OVER THE HORIZON, CYCON | 2024年
关键词
vulnerability detection; firmware analysis; firmware management; artificial intelligence;
D O I
10.23919/CyCon62501.2024.10685598
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Firmware vulnerability detection and asset management through a software bill of material (SBOM) approach is integral to defensive military operations. SBOMs provide a comprehensive list of software components, enabling military organizations to identify vulnerabilities within critical systems, including those controlling various functions in military platforms, as well as in operational technologies and Internet of Things devices. This proactive approach is essential for supply chain security, ensuring that software components are sourced from trusted suppliers and have not been tampered with during production, distribution, or through updates. It is a key element of defense strategies, allowing for rapid assessment, response, and mitigation of vulnerabilities, ultimately safeguarding military capabilities and information from cyber threats. In this paper, we propose ERS0, an SBOM system, driven by artificial intelligence (AI), for detecting firmware vulnerabilities and managing firmware assets. We harness the power of pre-trained large-scale language models to effectively address a wide array of string patterns, extending our coverage to thousands of third-party library patterns. Furthermore, we employ AI-powered code clone search models, enabling a more granular and precise search for vulnerabilities at the binary level, reducing our dependence on string analysis only. Additionally, our AI models extract high-level behavioral functionalities in firmware, such as communication and encryption, allowing us to quantitatively define the behavioral scope of firmware. In preliminary comparative assessments against open-source alternatives, our solution has demonstrated better SBOM coverage, accuracy in vulnerability identification, and a wider array of features.
引用
收藏
页码:141 / 160
页数:20
相关论文
共 20 条
  • [1] Chicco D, 2021, METHODS MOL BIOL, V2190, P73, DOI 10.1007/978-1-0716-0826-5_3
  • [2] Cho S, 2022, Cybersecurity considerations in autonomous ships
  • [3] Canine: Pre-training an Efficient Tokenization-Free Encoder for Language Representation
    Clark, Jonathan H.
    Garrette, Dan
    Turc, Iulia
    Wieting, John
    [J]. TRANSACTIONS OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS, 2022, 10 : 73 - 91
  • [4] E-M-B-A, e-m-b-a/embark: EMBArk-The firmware security scanning environment
  • [5] Fraunhofer FKIE, fkie-cad/FACTcore: Firmware analysis and comparison tool
  • [6] Fu ZW, 2023, Arxiv, DOI arXiv:2307.10631
  • [7] hex-rays, Hex Rays-State-of-the-art binary code analysis solutions
  • [8] Intel, intel/cve-bin-tool: The CVE binary tool
  • [9] Diversifying Accessibility Education: Presenting and Evaluating an Interdisciplinary Accessibility Training Program
    Kang, Jin
    Chan, Adrian D. C.
    Trudel, Chantal M. J.
    Vukovic, Boris
    Girouard, Audrey
    [J]. PROCEEDINGS OF 21ST KOLI CALLING CONFERENCE ON COMPUTING EDUCATION RESEARCH, KOLI CALLING 2021,, 2021,
  • [10] Lewis P, 2020, ADV NEUR IN, V33