DOIONLINE

DOIONLINE NO - IJASEAT-IRAJ-DOIONLINE-7422

Publish In
International Journal of Advances in Science, Engineering and Technology(IJASEAT)-IJASEAT
Journal Home
Volume Issue
Issue
Volume-5, Issue-1, Spl. Iss-3  ( Mar, 2017 )
Paper Title
A Study on The Weakness Analysis for Binary Code in Embedded Environments
Author Name
Yunsik Son, Junhojeong, Seman Oh
Affilition
Dep. of Brain and Cognitive Engineering, Korea University, Seoul, Rep. of Korea Electronic Commerce Institute, Dongguk University, Gyongju, Rep. of Korea Dep. of Computer Science and Engineering, Dongguk University, Seoul, Rep. of Korea
Pages
71-74
Abstract
Today's software is developed by collaborating with various levels of people rather than being developed by superior individuals. Also, recent software development is increasingly being developed using open source and third party libraries. On the other hand, Research shows that when using third party libraries, security analysis and testing are less than 50% in the development process. For those reasons, Security incidents caused by the use of such third-party libraries are continuously increasing, such as Heart Bleed, Shell Shock, POODLE, and DROWN, but security of binary libraries is very difficult to verify. In this paper, we analyze major security weaknesses based on the major CVEs generated in the embedded SW environment and use them for security weakness analyzer and intermediate language design for effective security weakness analysis of binary code in the future. Index Terms- Binary Code, Binary exploitation, Embedded Environments, Weakness Analysis, Vulnerability Analysis.
  View Paper