Tupni: Automatic Reverse Engineering of Input Formats

被引:0
|
作者
Cui, Weidong [1 ]
Peinado, Marcus
Chen, Karl
Wang, Helen J. [1 ]
Irun-Briz, Luiz
机构
[1] Microsoft Res, Redmond, WA 98052 USA
关键词
protocol reverse engineering; binary analysis;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recent work has established the importance of automatic reverse engineering of protocol or file format specifications. However, the formats reverse engineered by previous tools have missed important information that is critical for Security applications. In this paper, we present Tupni, a tool that can reverse engineer an input format with a rich set of information, including record sequences, record types, and input constraints. Tupni can generalize the format specification over multiple inputs. We have implemented a prototype of Tupni and evaluated it on 10 different formats: five file formats (WMF, BMP, JPG, PNG and TIF) and live network protocols (DNS, RPC, TFTP, HTTP and FTP). Tupni identified all record sequences in the test inputs. We also show that, by aggregating over multiple WMF files, Tupni can derive a more complete format specification for WMF. Furthermore, we demonstrate the utility of Tupni by using the rich information it provides for zero-day Vulnerability signature generation, which was not possible with previous reverse engineering tools.
引用
收藏
页码:391 / 402
页数:12
相关论文
共 50 条
  • [1] A taint based approach for automatic reverse engineering of gray-box file formats
    Cui, Baojiang
    Wang, Fuwei
    Hao, Yongle
    Wang, Lingyu
    SOFT COMPUTING, 2016, 20 (09) : 3563 - 3578
  • [2] A taint based approach for automatic reverse engineering of gray-box file formats
    Baojiang Cui
    Fuwei Wang
    Yongle Hao
    Lingyu Wang
    Soft Computing, 2016, 20 : 3563 - 3578
  • [3] AIFORE: Smart Fuzzing Based on Automatic Input Format Reverse Engineering
    Shi, Ji
    Wang, Zhun
    Feng, Zhiyao
    Lan, Yang
    Qin, Shisong
    You, Wei
    Zou, Wei
    Payer, Mathias
    Zhang, Chao
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 4967 - 4984
  • [4] Data Formats in Multineuronal Systems and Brain Reverse Engineering
    Dunin-Barkowski, Witali L.
    BIOLOGICALLY INSPIRED COGNITIVE ARCHITECTURES 2011, 2011, 233 : 103 - 103
  • [5] Automatic Reverse Engineering of Malware Emulators
    Sharif, Monirul
    Lanzi, Andrea
    Giffin, Jonathon
    Lee, Wenke
    PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2009, : 94 - 109
  • [6] Automatic Reverse Engineering of Classes' Relationships
    Hammad, Maen
    Abu-Wandi, Rajaa
    Aydeh, Haneen
    INFORMATION TECHNOLOGY: NEW GENERATIONS, 2016, 448 : 1267 - 1272
  • [7] Bitfiltrator: A general approach for reverse-engineering Xilinx bitstream formats
    Kashani, Sahand
    Emami, Mahyar
    Larus, James R.
    2022 32ND INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS, FPL, 2022, : 192 - 199
  • [8] Protocol Formats Reverse Engineering based on Association Rules in Wireless Environment
    Wang, Yong
    Zhang, Nan
    Wu, Yan-mei
    Su, Bin-bin
    Liao, Yong-jian
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 134 - 141
  • [9] Automatic detection of design pattern for reverse engineering
    Lee, Hakjin
    Youn, Hyunsang
    Lee, Eunseok
    SERA 2007: 5TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT, AND APPLICATIONS, PROCEEDINGS, 2007, : 577 - +
  • [10] A Survey of Automatic Protocol Reverse Engineering Tools
    Narayan, John
    Shukla, Sandeep K.
    Clancy, T. Charles
    ACM COMPUTING SURVEYS, 2015, 48 (03)