Tupni: Automatic Reverse Engineering of Input Formats

被引:0
|
作者
Cui, Weidong [1 ]
Peinado, Marcus
Chen, Karl
Wang, Helen J. [1 ]
Irun-Briz, Luiz
机构
[1] Microsoft Res, Redmond, WA 98052 USA
关键词
protocol reverse engineering; binary analysis;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recent work has established the importance of automatic reverse engineering of protocol or file format specifications. However, the formats reverse engineered by previous tools have missed important information that is critical for Security applications. In this paper, we present Tupni, a tool that can reverse engineer an input format with a rich set of information, including record sequences, record types, and input constraints. Tupni can generalize the format specification over multiple inputs. We have implemented a prototype of Tupni and evaluated it on 10 different formats: five file formats (WMF, BMP, JPG, PNG and TIF) and live network protocols (DNS, RPC, TFTP, HTTP and FTP). Tupni identified all record sequences in the test inputs. We also show that, by aggregating over multiple WMF files, Tupni can derive a more complete format specification for WMF. Furthermore, we demonstrate the utility of Tupni by using the rich information it provides for zero-day Vulnerability signature generation, which was not possible with previous reverse engineering tools.
引用
收藏
页码:391 / 402
页数:12
相关论文
共 50 条
  • [21] Development of automatic tolerance inspection through Reverse Engineering
    Bici, M.
    Campana, F.
    Trifiro, A.
    Testani, C.
    2014 IEEE INTERNATIONAL WORKSHOP ON METROLOGY FOR AEROSPACE (METROAEROSPACE), 2014, : 107 - 112
  • [22] Reverse Engineering the Hamming Code with Automatic Graph Learning
    Jacobsen, Noah B.
    3RD INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE IN INFORMATION AND COMMUNICATION (IEEE ICAIIC 2021), 2021, : 359 - 364
  • [23] Development of automatic surface reconstruction technique in reverse engineering
    Yao-Chen Tsai
    Chung-Yi Huang
    Kuan-Yuan Lin
    Jiing-Yih Lai
    Wen-Der Ueng
    The International Journal of Advanced Manufacturing Technology, 2009, 42 : 152 - 167
  • [24] Genie: Input Retargeting on the Web through Command Reverse Engineering
    Swearngin, Amanda
    Ko, Andrew J.
    Fogarty, James
    PROCEEDINGS OF THE 2017 ACM SIGCHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI'17), 2017, : 4703 - 4714
  • [25] Engineering section analysis based on automatic feature points matching in reverse engineering
    Shu, Lingjie
    PROCEEDINGS OF THE 2016 7TH INTERNATIONAL CONFERENCE ON MECHATRONICS, CONTROL AND MATERIALS (ICMCM 2016), 2016, 104 : 691 - 694
  • [26] Reverse engineering method to build automatic flouring gauge machine
    Budijono, A. P.
    Syah, S. S.
    Kurniawan, W. D.
    Habib, B. N.
    5TH ANNUAL APPLIED SCIENCE AND ENGINEERING CONFERENCE (AASEC 2020), 2021, 1098
  • [27] Discoverer: Automatic protocol reverse engineering from network traces
    Cui, Weidong
    Kannan, Jayanthkumar
    Wang, Helen J.
    USENIX ASSOCIATION PROCEEDINGS OF THE 16TH USENIX SECURITY SYMPOSIUM, 2007, : 199 - +
  • [28] Automatic reverse engineering algorithm for drug gene regulating networks
    Floares, Alexandru George
    PROCEDINGS OF THE 11TH IASTED INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND SOFT COMPUTING, 2007, : 238 - 243
  • [29] Automatic Reverse Engineering of Private Flight Control Protocols of UAVs
    Ji, Ran
    Wang, Jian
    Tang, Chaojing
    Li, Ruilin
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [30] An optimized strategy for automatic optical scanning of objects in reverse engineering
    Martins, FAR
    García-Bermejo, JG
    Zalama, E
    Perán, JR
    PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART B-JOURNAL OF ENGINEERING MANUFACTURE, 2003, 217 (08) : 1167 - 1171