Application of Taint Analysis to Study the Safety of Software of the Internet of Things Devices Based on the ARM Architecture

被引:8
作者
Ovasapyan, T. D. [1 ]
Knyazev, P., V [1 ]
Moskvin, D. A. [1 ]
机构
[1] Peter Great St Petersburg Polytech Univ, St Petersburg 195251, Russia
基金
俄罗斯基础研究基金会;
关键词
taint analysis; Internet of Things; cyberphysical systems; vulnerabilities;
D O I
10.3103/S0146411620080246
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The application of taint analysis to increase the efficiency of safety analysis of the software used by Internet-of-Things devices based on the ARM architecture is considered. A comparison of the existing dynamic instrumentation is made. As a result, we identified the most acceptable solution for the problem. The functionality of the selected tool has been refined in order to improve the efficiency of analyzing the influence of input data on the operation of the software under study.
引用
收藏
页码:834 / 840
页数:7
相关论文
共 15 条
[1]  
Bosman E, 2011, LECT NOTES COMPUT SC, V6961, P1, DOI 10.1007/978-3-642-23644-0_1
[2]  
Bruening D., 2004, Efficient, transparent, and comprehensive runtime code manipulation
[3]   Approaches to Protection of Applications Based on the TLS Protocol against Attacks Using Revoked Certificates [J].
Busygin, A. G. ;
Konoplev, A. S. ;
Kalinin, M. O. .
AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2016, 50 (08) :743-748
[4]   An Approach to Vulnerability Searching of Integer Overflows in the Executable Program Code [J].
Demidov, R. A. ;
Pechenkin, A. I. ;
Zegzhda, P. D. .
AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2018, 52 (08) :1022-1028
[5]   Application Model of Modern Artificial Neural Network Methods for the Analysis of Information Systems Security [J].
Demidov, R. A. Z. ;
Pechenkin, A. I. ;
Zegzhda, P. D. ;
Kalinin, M. O. .
AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2018, 52 (08) :965-970
[6]   Integer Overflow Vulnerabilities Detection in Software Binary Code [J].
Demidov, Roman ;
Pechenkin, Alexander ;
Zegzhda, Peter .
SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, :101-106
[7]   MAMBO: A Low-Overhead Dynamic Binary Modification Tool for ARM [J].
Gorgovan, Cosmin ;
D'Antras, Amanieu ;
Lujan, Mikel .
ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, 2016, 13 (01)
[8]  
Kang M.G., 2011, DTA++: Dynamic taint analysis with targeted control-flow propagation
[9]   Secure Processor Architecture Modeling for Large-Scale Systems [J].
Moskvin, D. ;
Zegzhda, D. ;
Nikolskiy, A. .
AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2015, 49 (08) :684-689
[10]   Clustering of Malicious Executable Files Based on the Sequence Analysis of System Calls [J].
Ognev, R. A. ;
Zhukovskii, E. V. ;
Zegzhda, D. P. .
AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2019, 53 (08) :1045-1055