A Toolchain for Assisting Migration of Software Executables Towards Post-Quantum Cryptography

Quantum computing poses a significant global threat to modern security mechanisms. As such, security experts and public sectors have issued guidelines to help organizations transition their software to post-quantum cryptography (PQC). However, there is a lack of (semi-)automatic tools to support thi...

Full description

Saved in:
Bibliographic Details
Main Authors: Norrathep Rattanavipanon, Jakapan Suaboot, Warodom Werapun
Format: Article
Language:English
Published: IEEE 2025-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10819261/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841550772665319424
author Norrathep Rattanavipanon
Jakapan Suaboot
Warodom Werapun
author_facet Norrathep Rattanavipanon
Jakapan Suaboot
Warodom Werapun
author_sort Norrathep Rattanavipanon
collection DOAJ
description Quantum computing poses a significant global threat to modern security mechanisms. As such, security experts and public sectors have issued guidelines to help organizations transition their software to post-quantum cryptography (PQC). However, there is a lack of (semi-)automatic tools to support this transition, particularly for software deployed as binary executables. To address this gap, in this work, we first propose a set of requirements necessary for this type of tool to detect quantum-vulnerable software executables. Following these requirements, we introduce <inline-formula> <tex-math notation="LaTeX">$\mathsf {QED}$ </tex-math></inline-formula>: a toolchain for Quantum-vulnerable Executable Detection. <inline-formula> <tex-math notation="LaTeX">$\mathsf {QED}$ </tex-math></inline-formula> uses a three-phase approach to identify quantum-vulnerable dependencies in a given set of executables, from file-level to API-level, and finally, precise identification of a static trace that triggers a quantum-vulnerable API. The key benefit of this design is that it provides efficiency without compromising accuracy, as it incorporates fast initial analyses to filter out executables unlikely to be quantum-vulnerable that in turn allows the more resource-intensive analysis to be performed on a smaller subset of executables. To demonstrate this claim, we evaluate <inline-formula> <tex-math notation="LaTeX">$\mathsf {QED}$ </tex-math></inline-formula> on both a synthetic dataset with four cryptography libraries and a real-world dataset with over 200 software executables. The results show that: 1) <inline-formula> <tex-math notation="LaTeX">$\mathsf {QED}$ </tex-math></inline-formula> discerns quantum-vulnerable from quantum-safe executables with 100% accuracy in the synthetic dataset; 2) <inline-formula> <tex-math notation="LaTeX">$\mathsf {QED}$ </tex-math></inline-formula> is practical and scalable, completing analyses on average in less than 4 seconds per real-world executable; and 3) <inline-formula> <tex-math notation="LaTeX">$\mathsf {QED}$ </tex-math></inline-formula> reduces the manual workload required by analysts to identify quantum-vulnerable executables in the real-world dataset by more than 90%.
format Article
id doaj-art-6fc954845233441989906dc8c389e53f
institution Kabale University
issn 2169-3536
language English
publishDate 2025-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj-art-6fc954845233441989906dc8c389e53f2025-01-10T00:01:08ZengIEEEIEEE Access2169-35362025-01-01134368438010.1109/ACCESS.2024.352430910819261A Toolchain for Assisting Migration of Software Executables Towards Post-Quantum CryptographyNorrathep Rattanavipanon0https://orcid.org/0000-0003-1192-5079Jakapan Suaboot1https://orcid.org/0000-0002-9519-0833Warodom Werapun2https://orcid.org/0000-0003-1915-036XCollege of Computing, Prince of Songkla University, Phuket Campus, Phuket, ThailandCollege of Computing, Prince of Songkla University, Phuket Campus, Phuket, ThailandCollege of Computing, Prince of Songkla University, Phuket Campus, Phuket, ThailandQuantum computing poses a significant global threat to modern security mechanisms. As such, security experts and public sectors have issued guidelines to help organizations transition their software to post-quantum cryptography (PQC). However, there is a lack of (semi-)automatic tools to support this transition, particularly for software deployed as binary executables. To address this gap, in this work, we first propose a set of requirements necessary for this type of tool to detect quantum-vulnerable software executables. Following these requirements, we introduce <inline-formula> <tex-math notation="LaTeX">$\mathsf {QED}$ </tex-math></inline-formula>: a toolchain for Quantum-vulnerable Executable Detection. <inline-formula> <tex-math notation="LaTeX">$\mathsf {QED}$ </tex-math></inline-formula> uses a three-phase approach to identify quantum-vulnerable dependencies in a given set of executables, from file-level to API-level, and finally, precise identification of a static trace that triggers a quantum-vulnerable API. The key benefit of this design is that it provides efficiency without compromising accuracy, as it incorporates fast initial analyses to filter out executables unlikely to be quantum-vulnerable that in turn allows the more resource-intensive analysis to be performed on a smaller subset of executables. To demonstrate this claim, we evaluate <inline-formula> <tex-math notation="LaTeX">$\mathsf {QED}$ </tex-math></inline-formula> on both a synthetic dataset with four cryptography libraries and a real-world dataset with over 200 software executables. The results show that: 1) <inline-formula> <tex-math notation="LaTeX">$\mathsf {QED}$ </tex-math></inline-formula> discerns quantum-vulnerable from quantum-safe executables with 100% accuracy in the synthetic dataset; 2) <inline-formula> <tex-math notation="LaTeX">$\mathsf {QED}$ </tex-math></inline-formula> is practical and scalable, completing analyses on average in less than 4 seconds per real-world executable; and 3) <inline-formula> <tex-math notation="LaTeX">$\mathsf {QED}$ </tex-math></inline-formula> reduces the manual workload required by analysts to identify quantum-vulnerable executables in the real-world dataset by more than 90%.https://ieeexplore.ieee.org/document/10819261/Binary analysispost-quantum cryptographypost-quantum migrationsoftware security
spellingShingle Norrathep Rattanavipanon
Jakapan Suaboot
Warodom Werapun
A Toolchain for Assisting Migration of Software Executables Towards Post-Quantum Cryptography
IEEE Access
Binary analysis
post-quantum cryptography
post-quantum migration
software security
title A Toolchain for Assisting Migration of Software Executables Towards Post-Quantum Cryptography
title_full A Toolchain for Assisting Migration of Software Executables Towards Post-Quantum Cryptography
title_fullStr A Toolchain for Assisting Migration of Software Executables Towards Post-Quantum Cryptography
title_full_unstemmed A Toolchain for Assisting Migration of Software Executables Towards Post-Quantum Cryptography
title_short A Toolchain for Assisting Migration of Software Executables Towards Post-Quantum Cryptography
title_sort toolchain for assisting migration of software executables towards post quantum cryptography
topic Binary analysis
post-quantum cryptography
post-quantum migration
software security
url https://ieeexplore.ieee.org/document/10819261/
work_keys_str_mv AT norratheprattanavipanon atoolchainforassistingmigrationofsoftwareexecutablestowardspostquantumcryptography
AT jakapansuaboot atoolchainforassistingmigrationofsoftwareexecutablestowardspostquantumcryptography
AT warodomwerapun atoolchainforassistingmigrationofsoftwareexecutablestowardspostquantumcryptography
AT norratheprattanavipanon toolchainforassistingmigrationofsoftwareexecutablestowardspostquantumcryptography
AT jakapansuaboot toolchainforassistingmigrationofsoftwareexecutablestowardspostquantumcryptography
AT warodomwerapun toolchainforassistingmigrationofsoftwareexecutablestowardspostquantumcryptography