Abstract
Instruction embedding is an essential technique in firmware security research and serves as a fundamental component in many vulnerability detection and security analysis methods for VANET. Instruction embedding maps the semantic information of instructions into fixed-dimensional vectors. However, the current instruction embedding approaches often neglect the operational requirements of resource-constrained environments typical of VANET. Moreover, the dependency on third-party disassembly tools for the extraction of instruction call graphs presents challenges related to runtime environment, thereby complicating the feasible application of instruction embedding techniques. To address these limitations, we propose a novel cross-architecture firmware instruction embedding model called Firm-Vehicle, specifically tailored for resource-constrained environments in VANET. Primarily, we devise a lightweight algorithm for extracting instruction call graphs, eliminating the reliance on third-party disassembly tools and improving the efficiency of call graphs extraction, thereby enhancing the instruction embedding model. Through evaluations and comparison with other approaches, Firm-Vehicle not only reduces the required time for instruction call graphs extraction but also enhances the stability of the instruction embedding model, enabling secure and efficient operation within the VANET environment.
W. Younas and J. Zhao—Contributing authors.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Chen, H., Liu, J., Wang, J., et al.: Towards secure intra-vehicle communications in 5G advanced and beyond: vulnerabilities, attacks and countermeasures. Veh. Commun. 39, 100548 (2023)
Chua, Z.L., Shen, S., Saxena, P., et al.: Neural nets can learn function type signatures from binaries. In: 26th USENIX Security Symposium (USENIX Security 17), pp. 99–116 (2017)
Dalvi, F., Sajjad, H., Durrani, N., et al.: Analyzing redundancy in pretrained transformer models. http://arXiv.org/abs/2004.04010 (2020)
Devlin, J., Chang, M., Lee, K., et al.: BERT: pre-training of deep bidirectional transformers for language understanding. CoRR abs/1810.04805. http://arXiv.org/abs/1810.04805 (2018)
Ding, S.H., Fung, B.C., Charland, P.: Asm2vec: boosting static representation robustness for binary clone search against code obfuscation and compiler optimization. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 472–489. IEEE (2019)
Duan, Y., Li, X., Wang, J., et al.: DeepBinDiff: learning program-wide code representations for binary diffing. In: Network and Distributed System Security Symposium (2020)
Feng, X., Zhu, X., Han, Q.L., et al.: Detecting vulnerability on IoT device firmware: a survey. IEEE/CAA J. Automatica Sinica 10(1), 25–41 (2022)
Ferguson, J.: Reverse engineering code with IDA Pro. Syngress (2008)
Guo, W., Mu, D., Xing, X., et al.: DEEPVSA: facilitating value-set analysis with deep learning for postmortem program analysis. In: 28th USENIX Security Symposium (USENIX Security 19), pp. 1787–1804 (2019)
Hinton, G., Vinyals, O., Dean, J.: Distilling the knowledge in a neural network. arXiv preprint: http://arXiv.org/abs/1503.02531 (2015)
Kim, G., Hong, S., Franz, M., et al.: Improving cross-platform binary analysis using representation learning via graph alignment. In: Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 151–163 (2022)
Lattner, C., Adve, V.: LLVM: a compilation framework for lifelong program analysis and transformation, San Jose, CA, USA, pp. 75–88 (2004)
Lee, Y.J., Choi, S.H., Kim, C., et al.: Learning binary code with deep learning to detect software weakness. In: KSII the 9th International Conference on Internet (ICONI) 2017 Symposium (2017)
Li, X., Qu, Y., Yin, H.: PalmTree: learning an assembly language model for instruction embedding. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp. 3236–3251 (2021)
Lin, J., Liu, Z., Wang, H., et al.: AMC: AutoML for model compression and acceleration on mobile devices. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) ECCV 2018. LNCS, vol. 11211, pp. 815–832 (2018). https://doi.org/10.1007/978-3-030-01234-2_48
Mikolov, T., Sutskever, I., Chen, K., et al.: Distributed representations of words and phrases and their compositionality. In: Advances in Neural Information Processing Systems, vol. 26 (2013)
Park, J., Lee, S., Hong, J., et al.: Static analysis of JNI programs via binary decompilation. IEEE Trans. Softw. Eng. (2023)
Park, S., Choi, W.: Regulated subspace projection based local model update compression for communication-efficient federated learning. IEEE J. Sel. Areas Commun. 41(4), 964–976 (2023)
Riley, G.F., Henderson, T.R.: The ns-3 network simulator. In: Wehrle, K., Güneş, M., Gross, J. (eds.) Modeling and Tools for Network Simulation, pp. 15–34. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-12331-3_2
Shen, M., Lu, H., Wang, F., et al.: Secure and efficient blockchain-assisted authentication for edge-integrated internet-of-vehicles. IEEE Trans. Veh. Technol. 71(11), 12250–12263 (2022)
Song, Q., Zhang, Y., Wang, B., et al.: Inter-bin: interaction-based cross-architecture IoT binary similarity comparison. IEEE Internet Things J. 9(20), 20018–20033 (2022)
Sutskever, I., Vinyals, O., Le, Q.V.: Sequence to sequence learning with neural networks. In: Advances in Neural Information Processing Systems, vol. 27 (2014)
Tang, R., Lu, Y., Liu, L., et al.: Distilling task-specific knowledge from BERT into simple neural networks. arXiv preprint: http://arXiv.org/abs/1903.12136 (2019)
Xu, X., Liu, C., Feng, Q., et al.: Neural network-based graph embedding for cross-platform binary code similarity detection. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 363–376 (2017)
Zhang, X., Sun, W., Pang, J., et al.: Similarity metric method for binary basic blocks of cross-instruction set architecture. In: Proceedings 2020 Workshop on Binary Analysis Research (2020)
Zhao, J., Wang, R.: FedMix: a Sybil attack detection system considering cross-layer information fusion and privacy protection. In: 2022 19th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), pp. 199–207. IEEE (2022)
Zuo, F., Li, X., Young, P., et al.: Neural machine translation inspired binary code similarity comparison beyond function pairs. arXiv preprint: http://arXiv.org/abs/1808.04706 (2018)
Zuo, S., Zhang, Q., Liang, C., et al.: MoeBERT: from BERT to mixture-of-experts via importance-guided adaptation. arXiv preprint: http://arXiv.org/abs/2204.07675 (2022)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Chen, R., Younas, W., Zhao, J. (2024). Firm-Vehicle: Trusted Communication Enabled Instruction Embedding Model for Resource-Constrained VANET Environments. In: Huang, DS., Chen, W., Pan, Y. (eds) Advanced Intelligent Computing Technology and Applications. ICIC 2024. Lecture Notes in Computer Science, vol 14869. Springer, Singapore. https://doi.org/10.1007/978-981-97-5603-2_32
Download citation
DOI: https://doi.org/10.1007/978-981-97-5603-2_32
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-97-5602-5
Online ISBN: 978-981-97-5603-2
eBook Packages: Computer ScienceComputer Science (R0)