Establishing Trust in Binary Analysis in Software Development and Applications

Christopher S. Calhoun, Joshua Reinhart, Gene A. Alarcon, August A. Capiola
{"title":"Establishing Trust in Binary Analysis in Software Development and Applications","authors":"Christopher S. Calhoun, Joshua Reinhart, Gene A. Alarcon, August A. Capiola","doi":"10.1109/ICHMS49158.2020.9209473","DOIUrl":null,"url":null,"abstract":"The current exploratory study examined software programmer trust in binary analysis techniques used to evaluate and understand binary code components. Experienced software developers participated in knowledge elicitations to identify factors affecting trust in tools and methods used for understanding binary code behavior and minimizing potential security vulnerabilities. Developer perceptions of trust in those tools to assess implementation risk in binary components were captured across a variety of application contexts. The software developers reported source security and vulnerability reports provided the best insight and awareness of potential issues or shortcomings in binary code. Further, applications where the potential impact to systems and data loss is high require relying on more than one type of analysis to ensure the binary component is sound. The findings suggest binary analysis is viable for identifying issues and potential vulnerabilities as part of a comprehensive solution for understanding binary code behavior and security vulnerabilities, but relying simply on binary analysis tools and binary release metadata appears insufficient to ensure a secure solution.","PeriodicalId":132917,"journal":{"name":"2020 IEEE International Conference on Human-Machine Systems (ICHMS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE International Conference on Human-Machine Systems (ICHMS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICHMS49158.2020.9209473","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The current exploratory study examined software programmer trust in binary analysis techniques used to evaluate and understand binary code components. Experienced software developers participated in knowledge elicitations to identify factors affecting trust in tools and methods used for understanding binary code behavior and minimizing potential security vulnerabilities. Developer perceptions of trust in those tools to assess implementation risk in binary components were captured across a variety of application contexts. The software developers reported source security and vulnerability reports provided the best insight and awareness of potential issues or shortcomings in binary code. Further, applications where the potential impact to systems and data loss is high require relying on more than one type of analysis to ensure the binary component is sound. The findings suggest binary analysis is viable for identifying issues and potential vulnerabilities as part of a comprehensive solution for understanding binary code behavior and security vulnerabilities, but relying simply on binary analysis tools and binary release metadata appears insufficient to ensure a secure solution.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
在软件开发和应用中建立二元分析的信任
当前的探索性研究检查了软件程序员对用于评估和理解二进制代码组件的二进制分析技术的信任。有经验的软件开发人员参与了知识启发,以确定影响对用于理解二进制代码行为和最小化潜在安全漏洞的工具和方法的信任的因素。开发人员对这些工具的信任程度,以评估二进制组件中的实现风险,在各种应用程序上下文中被捕获。软件开发人员报告的源代码安全性和漏洞报告提供了对二进制代码中潜在问题或缺陷的最佳洞察和意识。此外,对系统和数据丢失的潜在影响较大的应用程序需要依赖多种类型的分析来确保二进制组件是可靠的。研究结果表明,作为理解二进制代码行为和安全漏洞的综合解决方案的一部分,二进制分析对于识别问题和潜在漏洞是可行的,但是仅仅依靠二进制分析工具和二进制发布元数据似乎不足以确保安全解决方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Finite Time Sliding Mode Control of Connected Vehicle Platoons Guaranteeing String Stability User detection of threats with different security measures Driver Hazard Response When Processing On-road and In-vehicle Messaging of Non-Safety-Related Information Towards trustworthiness and transparency in social human-robot interaction Collaborative Environmental Monitoring through Teams of Trusted IoT devices
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1