QueryX: Symbolic Query on Decompiled Code for Finding Bugs in COTS Binaries.

HyungSeok Han, JeongOh Kyea,Yonghwi Jin, Jinoh Kang,Brian Pak,Insu Yun

SP(2023)

引用 1|浏览4
暂无评分
摘要
Extensible static checking tools, such as Sys and CodeQL, have successfully discovered bugs in source code. These tools allow analysts to write application-specific rules, referred to as queries. These queries can leverage the domain knowledge of analysts, thereby making the analysis more accurate and scalable. However, the majority of these tools are inapplicable to binary-only analysis. One exception, joern, translates a binary code into decompiled code and feeds the decompiled code into an ordinary C code analyzer. However, this approach is not sufficiently precise for symbolic analysis, as it overlooks the unique characteristics of decompiled code. While binary analysis platforms, such as angr, support symbolic analysis, analysts must understand their intermediate representations (IRs) although they are mostly working with decompiled code. In this paper, we propose a precise and scalable symbolic analysis called fearless symbolic analysis that uses intuitive queries for binary code and implement this in QUERYX. To make the query intuitive, QUERYX enables analysts to write queries on top of decompiled code instead of IRs. In particular, QUERYX supports callbacks on decompiled code, using which analysts can control symbolic analysis to discover bugs in the code. For precise analysis, we lift decompiled code into our IR named DNR and perform symbolic analysis on DNR while considering the characteristics of the decompiled code. Notably, DNR is only used internally such that it allows analysts to write queries regardless of using DNR. For scalability, QUERYX automatically reduces control-flow graphs using callbacks and ordering dependencies between callbacks that are specified in the queries. We applied QUERYX to the Windows kernel, the Windows system service, and an automotive binary. As a result, we found 15 unique bugs including 10 CVEs and earned $180,000 from the Microsoft bug bounty program.
更多
查看译文
关键词
application-specific rules,automotive binary,binary code,callbacks,control-flow graph,COTS binaries,CVEs,decompiled code,DNR,fearless symbolic analysis,intuitive queries,Microsoft bug bounty program,QueryX,symbolic query,Windows kernel,Windows system service
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要