Securing Network Information System Design: An Efficient Tool for DSP Undocumented Instruction Mining
As recently studied, the undocumented instructions in embedded processors that may cause catastrophic results for devices have become one of the main threats to system security. To tackle this issue, in this paper, we propose an undocumented instruction mining tool for digital signal processors name...
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-03-01
|
Series: | Applied Sciences |
Subjects: | |
Online Access: | https://www.mdpi.com/2076-3417/13/6/3931 |
_version_ | 1797613640647442432 |
---|---|
author | Xingcan Zhang Zhe Chen Jiawen Ye Huan Li Jian Wang Changlong Liu Bin Li |
author_facet | Xingcan Zhang Zhe Chen Jiawen Ye Huan Li Jian Wang Changlong Liu Bin Li |
author_sort | Xingcan Zhang |
collection | DOAJ |
description | As recently studied, the undocumented instructions in embedded processors that may cause catastrophic results for devices have become one of the main threats to system security. To tackle this issue, in this paper, we propose an undocumented instruction mining tool for digital signal processors named DSPUIM that can find out the undocumented instructions from the frequently used Digital Signal Processors (DSP) in network information systems. First, we analyzed the characteristics of the DSP instruction format to compress the instruction search space and improve the instruction search speed. Second, according to the public instruction set of DSPs, we built an instruction disassembly framework that helped us to identify all the undefined instructions. Finally, by testing the executability of undefined instructions automatically, we obtained the undocumented instructions for target DSPs. To demonstrate the effectiveness of our tool, we applied it on ten DSP processors of Texas Instruments (TI) and mined 335 undocumented instructions from them within 5 min. Some undocumented instructions have malicious functions, such as changing registers and denial of service, posing a security threat to the network devices using DSPs. |
first_indexed | 2024-03-11T06:57:44Z |
format | Article |
id | doaj.art-86b70167768d4920be7bbcdcaafc0999 |
institution | Directory Open Access Journal |
issn | 2076-3417 |
language | English |
last_indexed | 2024-03-11T06:57:44Z |
publishDate | 2023-03-01 |
publisher | MDPI AG |
record_format | Article |
series | Applied Sciences |
spelling | doaj.art-86b70167768d4920be7bbcdcaafc09992023-11-17T09:29:00ZengMDPI AGApplied Sciences2076-34172023-03-01136393110.3390/app13063931Securing Network Information System Design: An Efficient Tool for DSP Undocumented Instruction MiningXingcan Zhang0Zhe Chen1Jiawen Ye2Huan Li3Jian Wang4Changlong Liu5Bin Li6School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, ChinaSchool of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, ChinaSchool of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, ChinaSchool of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, ChinaSchool of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, ChinaThe 54th Research Institute of China Electronics Technology Group Corporation, Shijiazhuang 050081, ChinaThe 54th Research Institute of China Electronics Technology Group Corporation, Shijiazhuang 050081, ChinaAs recently studied, the undocumented instructions in embedded processors that may cause catastrophic results for devices have become one of the main threats to system security. To tackle this issue, in this paper, we propose an undocumented instruction mining tool for digital signal processors named DSPUIM that can find out the undocumented instructions from the frequently used Digital Signal Processors (DSP) in network information systems. First, we analyzed the characteristics of the DSP instruction format to compress the instruction search space and improve the instruction search speed. Second, according to the public instruction set of DSPs, we built an instruction disassembly framework that helped us to identify all the undefined instructions. Finally, by testing the executability of undefined instructions automatically, we obtained the undocumented instructions for target DSPs. To demonstrate the effectiveness of our tool, we applied it on ten DSP processors of Texas Instruments (TI) and mined 335 undocumented instructions from them within 5 min. Some undocumented instructions have malicious functions, such as changing registers and denial of service, posing a security threat to the network devices using DSPs.https://www.mdpi.com/2076-3417/13/6/3931undocumented instructionDSPdisassemblyinstruction analysis |
spellingShingle | Xingcan Zhang Zhe Chen Jiawen Ye Huan Li Jian Wang Changlong Liu Bin Li Securing Network Information System Design: An Efficient Tool for DSP Undocumented Instruction Mining Applied Sciences undocumented instruction DSP disassembly instruction analysis |
title | Securing Network Information System Design: An Efficient Tool for DSP Undocumented Instruction Mining |
title_full | Securing Network Information System Design: An Efficient Tool for DSP Undocumented Instruction Mining |
title_fullStr | Securing Network Information System Design: An Efficient Tool for DSP Undocumented Instruction Mining |
title_full_unstemmed | Securing Network Information System Design: An Efficient Tool for DSP Undocumented Instruction Mining |
title_short | Securing Network Information System Design: An Efficient Tool for DSP Undocumented Instruction Mining |
title_sort | securing network information system design an efficient tool for dsp undocumented instruction mining |
topic | undocumented instruction DSP disassembly instruction analysis |
url | https://www.mdpi.com/2076-3417/13/6/3931 |
work_keys_str_mv | AT xingcanzhang securingnetworkinformationsystemdesignanefficienttoolfordspundocumentedinstructionmining AT zhechen securingnetworkinformationsystemdesignanefficienttoolfordspundocumentedinstructionmining AT jiawenye securingnetworkinformationsystemdesignanefficienttoolfordspundocumentedinstructionmining AT huanli securingnetworkinformationsystemdesignanefficienttoolfordspundocumentedinstructionmining AT jianwang securingnetworkinformationsystemdesignanefficienttoolfordspundocumentedinstructionmining AT changlongliu securingnetworkinformationsystemdesignanefficienttoolfordspundocumentedinstructionmining AT binli securingnetworkinformationsystemdesignanefficienttoolfordspundocumentedinstructionmining |