SEESAW: A Tool for Detecting Memory Vulnerabilities in Protocol Stack Implementations

2021 19th ACM-IEEE International Conference on Formal Methods and Models for System Design (MEMOCODE)(2021)

引用 0|浏览4
As the number of Internet of Things (IoT) devices proliferate, an in-depth understanding of the IoT attack surface has become quintessential for dealing with the security and reliability risks. IoT devices and components execute implementations of various communication protocols. Vulnerabilities in the protocol stack implementations form an important part of the IoT attack surface. Therefore, finding memory errors in such implementations is essential for improving the IoT security and reliability. This paper presents a tool, SEESAW, that is built on top of a static analysis tool and a symbolic execution engine to achieve scalable analysis of protocol stack implementations. SEESAW leverages the API model of the analyzed code base to perform component-level analysis. SEESAW has been applied to the USB and Bluetooth modules within the Linux kernel. SEESAW can reproduce known memory vulnerabilities in a more scalable way compared to baseline symbolic execution.
IoT,Bluetooth,USB,memory vulnerability,symbolic execution,static analysis
AI 理解论文
Chat Paper