Skip to main content
Log in

Application of Taint Analysis to Study the Safety of Software of the Internet of Things Devices Based on the ARM Architecture

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

The application of taint analysis to increase the efficiency of safety analysis of the software used by Internet-of-Things devices based on the ARM architecture is considered. A comparison of the existing dynamic instrumentation is made. As a result, we identified the most acceptable solution for the problem. The functionality of the selected tool has been refined in order to improve the efficiency of analyzing the influence of input data on the operation of the software under study.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.
Fig. 2.
Fig. 3.
Fig. 4.
Fig. 5.
Fig. 6.

Similar content being viewed by others

REFERENCES

  1. Thierer, A. and Castillo, A., Projecting the Growth and Economic Impact of the Internet of Things, 2015. https://doi.org/10.2139/ssrn.2618794

  2. Sparks, P., The Route to a Trillion Devices, White Paper, ARM, 2017.

  3. Zegzhda, P.D., Kort, S.S., and Suprun, A.F., Detection of anomalies in behavior of the software with usage of Markov chains, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 820–825.

    Article  Google Scholar 

  4. Demidov, R.A., Pechenkin, A.I., and Zegzhda, P.D., An approach to vulnerability searching of integer overflows in the executable program code, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1022–1028.

    Article  Google Scholar 

  5. Demidov, R.A., Pechenkin, A.I., Zegzhda, P.D., and Kalinin, M.O., Application model of modern artificial neural network methods for the analysis of information systems security, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 965–970.

    Article  Google Scholar 

  6. Moskvin, D., Zegzhda, D., and Nikolskiy, A., Secure processor architecture modeling for large-scale systems, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 684–689.

    Article  Google Scholar 

  7. Kang, M.G., et al., Dta++: Dynamic taint analysis with targeted control-flow propagation, NDSS, 2011.

    Google Scholar 

  8. Demidov, R., Pechenkin, A., and Zegzhda, P., Integer overflow vulnerabilities detection in software binary code, ACM International Conference Proceeding Series, 2017, pp. 101–106. https://doi.org/10.1145/3136825.3136872

  9. Busygin, A.G., Konoplev, A.S., and Kalinin, M.O., Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 743–748.

    Article  Google Scholar 

  10. Ognev, R.A., Zhukovskii, E.V., and Zegzhda, D.P., Clustering of malicious executable files based on the sequence analysis of system calls, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 1045–1055.

    Article  Google Scholar 

  11. Bosman, E., Slowinska, A., and Bos, H., Minemu: The world’s fastest taint tracker, International Workshop on Recent Advances in Intrusion Detection, Menlo Park, CA, 2011, pp. 1–20.

  12. Schwartz, E.J., Avgerinos, T., and Brumley, D., All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask), 2010 IEEE Symposium on Security and Privacy, Berkeley/Oakland, CA, 2010, pp. 317–331.

  13. Bruening, D., Efficient, transparent, and comprehensive runtime code manipulation, Thesis, Mass. Inst. Technol., 2004.

  14. Gorgovan, C., d’Antras, A., and Luján, M., MAMBO: A low-overhead dynamic binary modification tool for ARM, ACM Trans. Archit. Code Optim., 2016, vol. 13, no. 1, p. 14.

    Article  Google Scholar 

  15. Quynh, N.A., Skorpio: Advanced Binary Instrumentation Framework, 2018.

Download references

Funding

The paper was supported by the Russian Foundation for Basic Research, project no. 18-29-03102.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to T. D. Ovasapyan or D. A. Moskvin.

Ethics declarations

The authors declare that they have no conflicts of interest.

Additional information

Translated by N. Semenova

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ovasapyan, T.D., Knyazev, P.V. & Moskvin, D.A. Application of Taint Analysis to Study the Safety of Software of the Internet of Things Devices Based on the ARM Architecture. Aut. Control Comp. Sci. 54, 834–840 (2020). https://doi.org/10.3103/S0146411620080246

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411620080246

Keywords:

Navigation