Description du projet
Renforcer la sécurité de l’IdO grâce à l’analyse binaire
Le rythme rapide de la numérisation et la transition vers l’internet des objets (IdO) ont entraîné la connexion à l’internet d’un nombre considérable de dispositifs existants. Malgré les nombreux avantages de cette transition, elle a également rendu les dispositifs existants et l’IdO plus vulnérables à la criminalité numérique en raison du manque de solutions disponibles. Financé par le Conseil européen de la recherche, le projet BASTION entend résoudre ce problème en élaborant un programme de recherche axé sur les techniques d’analyse binaire. Le projet vise à produire de nouvelles méthodes et technologies susceptibles d’améliorer la sécurité au sein de l’IdO. Pour ce faire, il concevra plusieurs technologies et méthodes utiles axées sur les logiciels afin de fournir des données cruciales pour les solutions de sécurité fondées sur l’analyse binaire.
Objectif
We are in the midst of the shift towards the Internet of Things (IoT), where more and more (legacy) devices are connected to the Internet and communicate with each other. This paradigm shift brings new security challenges and unfortunately many current security solutions are not applicable anymore, e.g. because of a lack of clear network boundaries or resource-constrained devices. However, security plays a central role: In addition to its classical function in protecting against manipulation and fraud, it also enables novel applications and innovative business models.
We propose a research program that leverages binary analysis techniques to improve the security within the IoT. We concentrate on the software level since this enables us to both analyze a given device for potential security vulnerabilities and add security features to harden the device against future attacks. More specifically, we concentrate on the firmware (i.e. the combination of persistent memory together with program code and data that powers such devices) and develop novel mechanism for binary analysis of such software. We design an intermediate language to abstract away from the concrete assembly level and this enables an analysis of many different platforms within a unified analysis framework. We transfer and extend program analysis techniques such as control-/data-flow analysis or symbolic execution and apply them to our IL. Given this novel toolset, we can analyze security properties of a given firmware image (e.g. uncovering undocumented functionality and detecting memory corruption or logical vulnerabilities,). We also explore how to harden a firmware by retrofitting security mechanisms (e.g. adding control-flow integrity or automatically eliminating unnecessary functionality). This research will deepen our fundamental understanding of binary analysis methods and apply it to a novel area as it lays the foundations of performing this analysis on the level of intermediate languages.
Champ scientifique
- engineering and technologymechanical engineeringmanufacturing engineering
- natural sciencescomputer and information sciencesinternetinternet of things
- natural sciencescomputer and information sciencessoftware
- social sciencessociologysocial issuescorruption
- natural sciencescomputer and information sciencescomputer security
Programme(s)
Thème(s)
Régime de financement
ERC-STG - Starting GrantInstitution d’accueil
44801 Bochum
Allemagne