AutoCPS: Control Software Dataset Generation for Semantic Reverse Engineering

被引:1
作者
Wang, Haoda [1 ]
Hauser, Christophe [1 ]
Garcia, Luis [1 ]
机构
[1] Univ Southern Calif, Informat Sci Inst, Los Angeles, CA 90089 USA
来源
2022 43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2022) | 2022年
关键词
Cyber-physical Systems; Reverse Engineering;
D O I
10.1109/SPW54247.2022.9833887
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Binary analysis of closed-source, low-level, and embedded systems software has emerged at the heart of cyber-physical vulnerability assessment of third-party or legacy devices in safety-critical systems. In particular, recovering the semantics of the source algorithmic implementations enables analysts to understand the context of a particular binary program snippet. However, experimentation and evaluation of binary analysis techniques on real-world embedded cyber-physical systems are limited to domain-specific testbeds with a low number of use cases-insufficient to support emerging data-driven techniques. Moreover, the use cases rarely have the source mathematical expressions, algorithms, and compiled binaries. In this paper, we present AUTOCPS, a framework for generating a large corpus of control systems binaries along with their source algorithmic expressions and source code. AUTOCPS enables researchers to tune the control system binary data generation by varying different permutations of cyber-physical modules, e.g., the underlying control algorithm, while ensuring a semantically valid binary. We initially constrain AUTOCPS to the flight software domain and generate over 4000 semantically different control systems source representations, which are then used to generate hundreds of thousands of binaries. We describe current and future use cases of AUTOCPS towards cyber-physical vulnerability assessment of safety-critical systems.
引用
收藏
页码:236 / 242
页数:7
相关论文
共 19 条
  • [1] A. D. Team, COD OV COPT, P2021
  • [2] [Anonymous], AUTOCPS GIT REPOSITO
  • [3] BIN H., 2009, INDIAN J SCI TECHNOL, V2, P12
  • [4] Bocchino Robert L. Jr., 2018, 32 ANN AIAA USU C SM, P1
  • [5] Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach
    Choi, Hongjun
    Lee, Wen-Chuan
    Aafer, Yousra
    Fei, Fan
    Tu, Zhan
    Zhang, Xiangyu
    Xu, Dongyan
    Deng, Xinyan
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 801 - 816
  • [6] Dvorak D., 2009, AIAA INFOTECH AEROSP, P1882
  • [7] Stuxnet and the Future of Cyber War
    Farwell, James P.
    Rohozinski, Rafal
    [J]. SURVIVAL, 2011, 53 (01) : 23 - 40
  • [8] Jackson PB, 2010, J HOPKINS APL TECH D, V29, P9
  • [9] ICSREF: A Framework for Automated Reverse Engineering of Industrial Control Systems Binaries
    Keliris, Anastasis
    Maniatakos, Michail
    [J]. 26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019), 2019,
  • [10] Kim D, 2022, Arxiv, DOI arXiv:2011.10749