Towards Reliable and Scalable Linux Kernel CVE Attribution in Automated Static Firmware Analyses

09/12/2022
by   René Helmke, et al.
0

In vulnerability assessments, software component-based CVE attribution is a common method to identify possibly vulnerable systems at scale. However, such version-centric approaches yield high false-positive rates for binary distributed Linux kernels in firmware images. Not filtering included vulnerable components is a reason for unreliable matching, as heterogeneous hardware properties, modularity, and numerous development streams result in a plethora of vendor-customized builds. To make a step towards increased result reliability while retaining scalability of the analysis method, we enrich version-based CVE matching with kernel-specific build data from binary images using automated static firmware analysis. We open source an attribution pipeline that gathers kernel configuration and target architecture to dry build the present kernel version and filter CVEs based on affected file references in record descriptions. In a case study with 127 router firmware images, we show that in comparison to naive version matching, our approach identifies 68 all version CVE matches as false-positives and reliably removes them from the result set. For 12 applicability. For 19.4 required file references in CVEs are missing.

READ FULL TEXT

page 1

page 5

page 6

research
09/03/2019

The Dynamics of Software Composition Analysis

Developers today use significant amounts of open source code, surfacing ...
research
05/03/2014

Automated Attribution and Intertextual Analysis

In this work, we employ quantitative methods from the realm of statistic...
research
10/25/2021

RoBin: Facilitating the Reproduction of Configuration-Related Vulnerability

Vulnerability reproduction paves a way in debugging software failures, w...
research
05/19/2020

High Velocity Kernel File Systems with Bento

High development velocity is critical for modern systems. This is especi...
research
07/06/2023

A Vulnerability of Attribution Methods Using Pre-Softmax Scores

We discuss a vulnerability involving a category of attribution methods u...
research
08/29/2018

Vulnerable Open Source Dependencies: Counting Those That Matter

BACKGROUND: Vulnerable dependencies are a known problem in today's open-...
research
10/20/2016

Adaptive Substring Extraction and Modified Local NBNN Scoring for Binary Feature-based Local Mobile Visual Search without False Positives

In this paper, we propose a stand-alone mobile visual search system base...

Please sign up or login with your details

Forgot password? Click here to reset