Securing Network Information System Design: An Efficient Tool for DSP Undocumented Instruction Mining

As recently studied, the undocumented instructions in embedded processors that may cause catastrophic results for devices have become one of the main threats to system security. To tackle this issue, in this paper, we propose an undocumented instruction mining tool for digital signal processors name...

Full description

Bibliographic Details
Main Authors: Xingcan Zhang, Zhe Chen, Jiawen Ye, Huan Li, Jian Wang, Changlong Liu, Bin Li
Format: Article
Language:English
Published: MDPI AG 2023-03-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/13/6/3931
_version_ 1797613640647442432
author Xingcan Zhang
Zhe Chen
Jiawen Ye
Huan Li
Jian Wang
Changlong Liu
Bin Li
author_facet Xingcan Zhang
Zhe Chen
Jiawen Ye
Huan Li
Jian Wang
Changlong Liu
Bin Li
author_sort Xingcan Zhang
collection DOAJ
description As recently studied, the undocumented instructions in embedded processors that may cause catastrophic results for devices have become one of the main threats to system security. To tackle this issue, in this paper, we propose an undocumented instruction mining tool for digital signal processors named DSPUIM that can find out the undocumented instructions from the frequently used Digital Signal Processors (DSP) in network information systems. First, we analyzed the characteristics of the DSP instruction format to compress the instruction search space and improve the instruction search speed. Second, according to the public instruction set of DSPs, we built an instruction disassembly framework that helped us to identify all the undefined instructions. Finally, by testing the executability of undefined instructions automatically, we obtained the undocumented instructions for target DSPs. To demonstrate the effectiveness of our tool, we applied it on ten DSP processors of Texas Instruments (TI) and mined 335 undocumented instructions from them within 5 min. Some undocumented instructions have malicious functions, such as changing registers and denial of service, posing a security threat to the network devices using DSPs.
first_indexed 2024-03-11T06:57:44Z
format Article
id doaj.art-86b70167768d4920be7bbcdcaafc0999
institution Directory Open Access Journal
issn 2076-3417
language English
last_indexed 2024-03-11T06:57:44Z
publishDate 2023-03-01
publisher MDPI AG
record_format Article
series Applied Sciences
spelling doaj.art-86b70167768d4920be7bbcdcaafc09992023-11-17T09:29:00ZengMDPI AGApplied Sciences2076-34172023-03-01136393110.3390/app13063931Securing Network Information System Design: An Efficient Tool for DSP Undocumented Instruction MiningXingcan Zhang0Zhe Chen1Jiawen Ye2Huan Li3Jian Wang4Changlong Liu5Bin Li6School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, ChinaSchool of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, ChinaSchool of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, ChinaSchool of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, ChinaSchool of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, ChinaThe 54th Research Institute of China Electronics Technology Group Corporation, Shijiazhuang 050081, ChinaThe 54th Research Institute of China Electronics Technology Group Corporation, Shijiazhuang 050081, ChinaAs recently studied, the undocumented instructions in embedded processors that may cause catastrophic results for devices have become one of the main threats to system security. To tackle this issue, in this paper, we propose an undocumented instruction mining tool for digital signal processors named DSPUIM that can find out the undocumented instructions from the frequently used Digital Signal Processors (DSP) in network information systems. First, we analyzed the characteristics of the DSP instruction format to compress the instruction search space and improve the instruction search speed. Second, according to the public instruction set of DSPs, we built an instruction disassembly framework that helped us to identify all the undefined instructions. Finally, by testing the executability of undefined instructions automatically, we obtained the undocumented instructions for target DSPs. To demonstrate the effectiveness of our tool, we applied it on ten DSP processors of Texas Instruments (TI) and mined 335 undocumented instructions from them within 5 min. Some undocumented instructions have malicious functions, such as changing registers and denial of service, posing a security threat to the network devices using DSPs.https://www.mdpi.com/2076-3417/13/6/3931undocumented instructionDSPdisassemblyinstruction analysis
spellingShingle Xingcan Zhang
Zhe Chen
Jiawen Ye
Huan Li
Jian Wang
Changlong Liu
Bin Li
Securing Network Information System Design: An Efficient Tool for DSP Undocumented Instruction Mining
Applied Sciences
undocumented instruction
DSP
disassembly
instruction analysis
title Securing Network Information System Design: An Efficient Tool for DSP Undocumented Instruction Mining
title_full Securing Network Information System Design: An Efficient Tool for DSP Undocumented Instruction Mining
title_fullStr Securing Network Information System Design: An Efficient Tool for DSP Undocumented Instruction Mining
title_full_unstemmed Securing Network Information System Design: An Efficient Tool for DSP Undocumented Instruction Mining
title_short Securing Network Information System Design: An Efficient Tool for DSP Undocumented Instruction Mining
title_sort securing network information system design an efficient tool for dsp undocumented instruction mining
topic undocumented instruction
DSP
disassembly
instruction analysis
url https://www.mdpi.com/2076-3417/13/6/3931
work_keys_str_mv AT xingcanzhang securingnetworkinformationsystemdesignanefficienttoolfordspundocumentedinstructionmining
AT zhechen securingnetworkinformationsystemdesignanefficienttoolfordspundocumentedinstructionmining
AT jiawenye securingnetworkinformationsystemdesignanefficienttoolfordspundocumentedinstructionmining
AT huanli securingnetworkinformationsystemdesignanefficienttoolfordspundocumentedinstructionmining
AT jianwang securingnetworkinformationsystemdesignanefficienttoolfordspundocumentedinstructionmining
AT changlongliu securingnetworkinformationsystemdesignanefficienttoolfordspundocumentedinstructionmining
AT binli securingnetworkinformationsystemdesignanefficienttoolfordspundocumentedinstructionmining