Paper Title :A Study on The Weakness Analysis for Binary Code in Embedded Environments
Author :Yunsik Son, Junhojeong, Seman Oh
Article Citation :Yunsik Son ,Junhojeong ,Seman Oh ,
(2017 ) " A Study on The Weakness Analysis for Binary Code in Embedded Environments " ,
International Journal of Advances in Science, Engineering and Technology(IJASEAT) ,
pp. 71-74,
Volume-5, Issue-1, Spl. Iss-3
Abstract : Today's software is developed by collaborating with various levels of people rather than being developed by
superior individuals. Also, recent software development is increasingly being developed using open source and third party
libraries. On the other hand, Research shows that when using third party libraries, security analysis and testing are less than
50% in the development process. For those reasons, Security incidents caused by the use of such third-party libraries are
continuously increasing, such as Heart Bleed, Shell Shock, POODLE, and DROWN, but security of binary libraries is very
difficult to verify. In this paper, we analyze major security weaknesses based on the major CVEs generated in the embedded
SW environment and use them for security weakness analyzer and intermediate language design for effective security
weakness analysis of binary code in the future.
Index Terms- Binary Code, Binary exploitation, Embedded Environments, Weakness Analysis, Vulnerability Analysis.
Type : Research paper
Published : Volume-5, Issue-1, Spl. Iss-3
DOIONLINE NO - IJASEAT-IRAJ-DOIONLINE-7422
View Here
Copyright: © Institute of Research and Journals
|
|
| |
|
PDF |
| |
Viewed - 40 |
| |
Published on 2017-06-01 |
|