首页> 外文会议>Annual IEEE/ACM International Symposium on Microarchitecture >End-to-End Automated Exploit Generation for Validating the Security of Processor Designs
【24h】

End-to-End Automated Exploit Generation for Validating the Security of Processor Designs

机译:端到端自动漏洞利用生成,用于验证处理器设计的安全性

获取原文

摘要

This paper presents Coppelia, an end-to-end tool that, given a processor design and a set of security-critical invariants, automatically generates complete, replayable exploit programs to help designers find, contextualize, and assess the security threat of hardware vulnerabilities. In Coppelia, we develop a hardware-oriented backward symbolic execution engine with a new cycle stitching method and fast validation technique, along with several optimizations for exploit generation. We then add program stubs to complete the exploit. We evaluate Coppelia on three CPUs of different architectures. Coppelia is able to find and generate exploits for 29 of 31 known vulnerabilities in these CPUs, including 11 vulnerabilities that commercial and academic model checking tools can not find. All of the generated exploits are successfully replayable on an FPGA board. Moreover, Coppelia finds 4 new vulnerabilities along with exploits in these CPUs. We also use Coppelia to verify whether a security patch indeed fixed a vulnerability, and to refine a set of assertions.
机译:本文介绍了Coppelia,这是一种端到端工具,在给定处理器设计和一组安全关键不变式的情况下,它会自动生成完整的,可重播的漏洞利用程序,以帮助设计人员查找,情境化和评估硬件漏洞的安全威胁。在Coppelia中,我们开发了一种面向硬件的后向符号执行引擎,该引擎具有新的循环缝合方法和快速验证技术,以及用于漏洞利用的几种优化方法。然后,我们添加程序存根以完成利用。我们在不同架构的三个CPU上评估Coppelia。 Coppelia能够找到并生成这些CPU中31个已知漏洞中的29个漏洞,包括商业和学术模型检查工具找不到的11个漏洞。所有生成的漏洞利用程序均可在FPGA板上成功重播。此外,Coppelia在这些CPU中发现了4个新漏洞以及漏洞利用。我们还使用Coppelia来验证安全补丁程序是否确实修复了漏洞,并完善了一组断言。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号