![]() This assists us in the manual correction of the problematic rules. We, therefore, propose incorporating symbolic execution to quickly pinpoint the root cause. The extracted condition-action rules might not be complete or even be wrong. By checking, executing, and chaining them at runtime, we can dynamically synthesize a peripheral model for each firmware execution. Using NLP, we translate peripheral behaviors in human language (documented in chip manuals) into a set of structured condition-action rules. In this work, we propose a new approach that builds peripheral models from the peripheral specification. This is problematic because the firmware sometimes does not contain enough clues to support the emulation or even contains misleading information (e.g. Existing work finds out how to respond to peripheral read operations by analyzing the target firmware. Our data and code are publicly available.Įmulating firmware of microcontrollers is challenging due to the lack of peripheral models. We believe that SPEC5G will enable a new research direction into automatic analyses for the 5G cellular network protocol and numerous related downstream tasks. Our results show the value of our 5G-centric dataset in 5G protocol analysis automation. On the other hand, summarization can help developers and practitioners understand the high level of the protocol, which is itself a daunting task. Security-related text classification can be used to extract relevant security-related properties for protocol testing. By leveraging large-scale pre-trained language models that have achieved state-of-the-art results on NLP tasks, we use this dataset for security-related text classification and summarization. The dataset contains 3,547,586 sentences with 134M words, from 13094 cellular network specifications and 13 online websites. To reduce such manual effort, in this paper, we curate SPEC5G the first-ever public 5G dataset for NLP research. However, all approaches to the 5G protocol development and security analysis, e.g., property extraction, protocol summarization, and semantic analysis of the protocol specifications and implementations are completely manual. Therefore, its development, analysis, and security are critical. It is the state-of-the-art global wireless standard that enables an advanced kind of network designed to connect virtually everyone and everything with increased speed and reduced latency. 5G is the 5th generation cellular network protocol.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |