计算机科学
固件
逆向工程
信息物理系统
小贩
混淆
杠杆(统计)
桥接(联网)
利用
软件
语义学(计算机科学)
嵌入式软件
软件工程
程序设计语言
计算机安全
人工智能
操作系统
营销
业务
作者
AnMei Dasbach-Prisk,Cory Dewitt,Luis Antonio Ribot García
标识
DOI:10.1145/3628356.3630117
摘要
Safety-critical cyber-physical systems, such as autonomous vehicles and medical devices, are often driven by notions of state provided by sensor information translated through embedded firmware. This sensor pipeline is often a fragmented supply chain across vendors, and analyzing the associated security properties entails semantic reverse engineering of third-party software, i.e., mapping low-level software representations to cyber-physical models without access to source code. This mapping is a manual, time-consuming, and error-prone process. This paper introduces SensorLoader, a tool designed to automate mapping sensor semantics across all layers of closed-source software representations. SensorLoader exploits open-source knowledge, potentially derived from structured vendor description files or unstructured vendor datasheets, to extract and infer sensor semantics. We leverage large language models to extract sensor semantics from unstructured sources and map the semantics to memory maps and structures used by the Ghidra reverse engineering framework. We formalize the limitations of this automatic extraction and demonstrate how our approach can streamline the reverse engineering process for embedded systems. Preliminary evaluations suggest that SensorLoader can effectively and scalably aid in identifying vulnerabilities and deviations from expected behaviors, offering a more efficient pathway to secure cyber-physical systems.
科研通智能强力驱动
Strongly Powered by AbleSci AI