Firm-Vehicle: Trusted Communication Enabled Instruction Embedding Model for Resource-Constrained VANET Environments | SpringerLink
Skip to main content

Firm-Vehicle: Trusted Communication Enabled Instruction Embedding Model for Resource-Constrained VANET Environments

  • Conference paper
  • First Online:
Advanced Intelligent Computing Technology and Applications (ICIC 2024)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14869))

Included in the following conference series:

  • 644 Accesses

Abstract

Instruction embedding is an essential technique in firmware security research and serves as a fundamental component in many vulnerability detection and security analysis methods for VANET. Instruction embedding maps the semantic information of instructions into fixed-dimensional vectors. However, the current instruction embedding approaches often neglect the operational requirements of resource-constrained environments typical of VANET. Moreover, the dependency on third-party disassembly tools for the extraction of instruction call graphs presents challenges related to runtime environment, thereby complicating the feasible application of instruction embedding techniques. To address these limitations, we propose a novel cross-architecture firmware instruction embedding model called Firm-Vehicle, specifically tailored for resource-constrained environments in VANET. Primarily, we devise a lightweight algorithm for extracting instruction call graphs, eliminating the reliance on third-party disassembly tools and improving the efficiency of call graphs extraction, thereby enhancing the instruction embedding model. Through evaluations and comparison with other approaches, Firm-Vehicle not only reduces the required time for instruction call graphs extraction but also enhances the stability of the instruction embedding model, enabling secure and efficient operation within the VANET environment.

W. Younas and J. Zhao—Contributing authors.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 9380
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 11725
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Chen, H., Liu, J., Wang, J., et al.: Towards secure intra-vehicle communications in 5G advanced and beyond: vulnerabilities, attacks and countermeasures. Veh. Commun. 39, 100548 (2023)

    Google Scholar 

  2. Chua, Z.L., Shen, S., Saxena, P., et al.: Neural nets can learn function type signatures from binaries. In: 26th USENIX Security Symposium (USENIX Security 17), pp. 99–116 (2017)

    Google Scholar 

  3. Dalvi, F., Sajjad, H., Durrani, N., et al.: Analyzing redundancy in pretrained transformer models. http://arXiv.org/abs/2004.04010 (2020)

  4. Devlin, J., Chang, M., Lee, K., et al.: BERT: pre-training of deep bidirectional transformers for language understanding. CoRR abs/1810.04805. http://arXiv.org/abs/1810.04805 (2018)

  5. Ding, S.H., Fung, B.C., Charland, P.: Asm2vec: boosting static representation robustness for binary clone search against code obfuscation and compiler optimization. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 472–489. IEEE (2019)

    Google Scholar 

  6. Duan, Y., Li, X., Wang, J., et al.: DeepBinDiff: learning program-wide code representations for binary diffing. In: Network and Distributed System Security Symposium (2020)

    Google Scholar 

  7. Feng, X., Zhu, X., Han, Q.L., et al.: Detecting vulnerability on IoT device firmware: a survey. IEEE/CAA J. Automatica Sinica 10(1), 25–41 (2022)

    Article  Google Scholar 

  8. Ferguson, J.: Reverse engineering code with IDA Pro. Syngress (2008)

    Google Scholar 

  9. Guo, W., Mu, D., Xing, X., et al.: DEEPVSA: facilitating value-set analysis with deep learning for postmortem program analysis. In: 28th USENIX Security Symposium (USENIX Security 19), pp. 1787–1804 (2019)

    Google Scholar 

  10. Hinton, G., Vinyals, O., Dean, J.: Distilling the knowledge in a neural network. arXiv preprint: http://arXiv.org/abs/1503.02531 (2015)

  11. Kim, G., Hong, S., Franz, M., et al.: Improving cross-platform binary analysis using representation learning via graph alignment. In: Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 151–163 (2022)

    Google Scholar 

  12. Lattner, C., Adve, V.: LLVM: a compilation framework for lifelong program analysis and transformation, San Jose, CA, USA, pp. 75–88 (2004)

    Google Scholar 

  13. Lee, Y.J., Choi, S.H., Kim, C., et al.: Learning binary code with deep learning to detect software weakness. In: KSII the 9th International Conference on Internet (ICONI) 2017 Symposium (2017)

    Google Scholar 

  14. Li, X., Qu, Y., Yin, H.: PalmTree: learning an assembly language model for instruction embedding. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp. 3236–3251 (2021)

    Google Scholar 

  15. Lin, J., Liu, Z., Wang, H., et al.: AMC: AutoML for model compression and acceleration on mobile devices. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) ECCV 2018. LNCS, vol. 11211, pp. 815–832 (2018). https://doi.org/10.1007/978-3-030-01234-2_48

  16. Mikolov, T., Sutskever, I., Chen, K., et al.: Distributed representations of words and phrases and their compositionality. In: Advances in Neural Information Processing Systems, vol. 26 (2013)

    Google Scholar 

  17. Park, J., Lee, S., Hong, J., et al.: Static analysis of JNI programs via binary decompilation. IEEE Trans. Softw. Eng. (2023)

    Google Scholar 

  18. Park, S., Choi, W.: Regulated subspace projection based local model update compression for communication-efficient federated learning. IEEE J. Sel. Areas Commun. 41(4), 964–976 (2023)

    Article  Google Scholar 

  19. Riley, G.F., Henderson, T.R.: The ns-3 network simulator. In: Wehrle, K., Güneş, M., Gross, J. (eds.) Modeling and Tools for Network Simulation, pp. 15–34. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-12331-3_2

  20. Shen, M., Lu, H., Wang, F., et al.: Secure and efficient blockchain-assisted authentication for edge-integrated internet-of-vehicles. IEEE Trans. Veh. Technol. 71(11), 12250–12263 (2022)

    Article  Google Scholar 

  21. Song, Q., Zhang, Y., Wang, B., et al.: Inter-bin: interaction-based cross-architecture IoT binary similarity comparison. IEEE Internet Things J. 9(20), 20018–20033 (2022)

    Article  Google Scholar 

  22. Sutskever, I., Vinyals, O., Le, Q.V.: Sequence to sequence learning with neural networks. In: Advances in Neural Information Processing Systems, vol. 27 (2014)

    Google Scholar 

  23. Tang, R., Lu, Y., Liu, L., et al.: Distilling task-specific knowledge from BERT into simple neural networks. arXiv preprint: http://arXiv.org/abs/1903.12136 (2019)

  24. Xu, X., Liu, C., Feng, Q., et al.: Neural network-based graph embedding for cross-platform binary code similarity detection. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 363–376 (2017)

    Google Scholar 

  25. Zhang, X., Sun, W., Pang, J., et al.: Similarity metric method for binary basic blocks of cross-instruction set architecture. In: Proceedings 2020 Workshop on Binary Analysis Research (2020)

    Google Scholar 

  26. Zhao, J., Wang, R.: FedMix: a Sybil attack detection system considering cross-layer information fusion and privacy protection. In: 2022 19th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), pp. 199–207. IEEE (2022)

    Google Scholar 

  27. Zuo, F., Li, X., Young, P., et al.: Neural machine translation inspired binary code similarity comparison beyond function pairs. arXiv preprint: http://arXiv.org/abs/1808.04706 (2018)

  28. Zuo, S., Zhang, Q., Liang, C., et al.: MoeBERT: from BERT to mixture-of-experts via importance-guided adaptation. arXiv preprint: http://arXiv.org/abs/2204.07675 (2022)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rui Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chen, R., Younas, W., Zhao, J. (2024). Firm-Vehicle: Trusted Communication Enabled Instruction Embedding Model for Resource-Constrained VANET Environments. In: Huang, DS., Chen, W., Pan, Y. (eds) Advanced Intelligent Computing Technology and Applications. ICIC 2024. Lecture Notes in Computer Science, vol 14869. Springer, Singapore. https://doi.org/10.1007/978-981-97-5603-2_32

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-5603-2_32

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-5602-5

  • Online ISBN: 978-981-97-5603-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics