首页> 外文会议>Annual IEEE/ACM International Symposium on Microarchitecture >End-to-End Automated Exploit Generation for Validating the Security of Processor Designs
【24h】

End-to-End Automated Exploit Generation for Validating the Security of Processor Designs

机译:用于验证处理器设计安全性的端到端自动化开发生成

获取原文

摘要

This paper presents Coppelia, an end-to-end tool that, given a processor design and a set of security-critical invariants, automatically generates complete, replayable exploit programs to help designers find, contextualize, and assess the security threat of hardware vulnerabilities. In Coppelia, we develop a hardware-oriented backward symbolic execution engine with a new cycle stitching method and fast validation technique, along with several optimizations for exploit generation. We then add program stubs to complete the exploit. We evaluate Coppelia on three CPUs of different architectures. Coppelia is able to find and generate exploits for 29 of 31 known vulnerabilities in these CPUs, including 11 vulnerabilities that commercial and academic model checking tools can not find. All of the generated exploits are successfully replayable on an FPGA board. Moreover, Coppelia finds 4 new vulnerabilities along with exploits in these CPUs. We also use Coppelia to verify whether a security patch indeed fixed a vulnerability, and to refine a set of assertions.
机译:本文介绍了Coppelia,一个端到端的工具,给定处理器设计和一组安全关键不变性,自动生成完整的可重复的漏洞仪编程,以帮助设计人员找到,上下文化和评估硬件漏洞的安全威胁。在CopPelia中,我们使用新的循环拼接方法和快速验证技术开发一个面向硬件的向后符号执行引擎,以及用于利用生成的几种优化。然后,我们添加程序存根来完成漏洞。我们评估COPPELIA在不同架构的三个CPU上。 CopPelia能够在这些CPU中找到并生成31个已知漏洞中的漏洞,其中包括11个漏洞,即商业和学术模型检查工具找不到。所有生成的漏洞都在FPGA板上成功重放。此外,Coppelia在这些CPU中找到了4个新的漏洞以及漏洞。我们还使用Coppelia来验证安全修补程序是否确实修复了漏洞,并改进了一组断言。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号