CRAX: Software Crash Analysis for Automatic Exploit Generation by Modeling Attacks as Symbolic Continuations.

Saved in:
Bibliographic Details
Title: CRAX: Software Crash Analysis for Automatic Exploit Generation by Modeling Attacks as Symbolic Continuations.
Authors: Huang, Shih-Kun, Huang, Min-Hsiang, Huang, Po-Yen, Lai, Chung-Wei, Lu, Han-Lin, Leong, Wai-Meng
Source: 2012 IEEE Sixth International Conference on Software Security & Reliability; 1/ 1/2012, p78-87, 10p
Abstract: We present a simple framework capable of automatically generating attacks that exploit control flow hijacking vulnerabilities. We analyze given software crashes and perform symbolic execution in concolic mode, using a whole system environment model. The framework uses an end-to-end approach to generate exploits for various applications, including 16 medium scale benchmark programs, and several large scale applications, such as Mplayer (a media player), Unrar (an archiver) and Foxit(a pdf reader), with stack/heap overflow, off-by-one overflow, use of uninitialized variable, format string vulnerabilities. Notably, these applications have been typically regarded as fuzzing preys, but still require a manual process with security knowledge to produce mitigation-hardened exploits. Using our system to produce exploits is a fully automated and straightforward process for crashed software without source. We produce the exploits within six minutes for medium scale of programs, and as long as 80 minutes for mplayer (about 500,000 LOC), after constraint reductions. Our results demonstrate that the link between software bugs and security vulnerabilities can be automatically bridged. [ABSTRACT FROM PUBLISHER]
Copyright of 2012 IEEE Sixth International Conference on Software Security & Reliability is the property of IEEE and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
Database: Complementary Index
FullText Text:
  Availability: 0
CustomLinks:
  – Url: https://resolver.ebscohost.com/openurl?sid=EBSCO:edb&genre=book&issn=&ISBN=9781467320672&volume=&issue=&date=&spage=78&pages=78-87&title=2012 IEEE Sixth International Conference on Software Security & Reliability&atitle=CRAX%3A%20Software%20Crash%20Analysis%20for%20Automatic%20Exploit%20Generation%20by%20Modeling%20Attacks%20as%20Symbolic%20Continuations.&aulast=Huang%2C%20Shih-Kun&id=DOI:10.1109/SERE.2012.20
    Name: Full Text Finder
    Category: fullText
    Text: Full Text Finder
    Icon: https://imageserver.ebscohost.com/branding/images/FTF.gif
    MouseOverText: Full Text Finder
Header DbId: edb
DbLabel: Complementary Index
An: 86572577
RelevancyScore: 849
AccessLevel: 6
PubType: Conference
PubTypeId: conference
PreciseRelevancyScore: 849.323059082031
IllustrationInfo
Items – Name: Title
  Label: Title
  Group: Ti
  Data: CRAX: Software Crash Analysis for Automatic Exploit Generation by Modeling Attacks as Symbolic Continuations.
– Name: Author
  Label: Authors
  Group: Au
  Data: <searchLink fieldCode="AR" term="%22Huang%2C+Shih-Kun%22">Huang, Shih-Kun</searchLink><br /><searchLink fieldCode="AR" term="%22Huang%2C+Min-Hsiang%22">Huang, Min-Hsiang</searchLink><br /><searchLink fieldCode="AR" term="%22Huang%2C+Po-Yen%22">Huang, Po-Yen</searchLink><br /><searchLink fieldCode="AR" term="%22Lai%2C+Chung-Wei%22">Lai, Chung-Wei</searchLink><br /><searchLink fieldCode="AR" term="%22Lu%2C+Han-Lin%22">Lu, Han-Lin</searchLink><br /><searchLink fieldCode="AR" term="%22Leong%2C+Wai-Meng%22">Leong, Wai-Meng</searchLink>
– Name: TitleSource
  Label: Source
  Group: Src
  Data: 2012 IEEE Sixth International Conference on Software Security & Reliability; 1/ 1/2012, p78-87, 10p
– Name: Abstract
  Label: Abstract
  Group: Ab
  Data: We present a simple framework capable of automatically generating attacks that exploit control flow hijacking vulnerabilities. We analyze given software crashes and perform symbolic execution in concolic mode, using a whole system environment model. The framework uses an end-to-end approach to generate exploits for various applications, including 16 medium scale benchmark programs, and several large scale applications, such as Mplayer (a media player), Unrar (an archiver) and Foxit(a pdf reader), with stack/heap overflow, off-by-one overflow, use of uninitialized variable, format string vulnerabilities. Notably, these applications have been typically regarded as fuzzing preys, but still require a manual process with security knowledge to produce mitigation-hardened exploits. Using our system to produce exploits is a fully automated and straightforward process for crashed software without source. We produce the exploits within six minutes for medium scale of programs, and as long as 80 minutes for mplayer (about 500,000 LOC), after constraint reductions. Our results demonstrate that the link between software bugs and security vulnerabilities can be automatically bridged. [ABSTRACT FROM PUBLISHER]
– Name: Abstract
  Label:
  Group: Ab
  Data: <i>Copyright of 2012 IEEE Sixth International Conference on Software Security & Reliability is the property of IEEE and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract.</i> (Copyright applies to all Abstracts.)
PLink https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edb&AN=86572577
RecordInfo BibRecord:
  BibEntity:
    Identifiers:
      – Type: doi
        Value: 10.1109/SERE.2012.20
    Languages:
      – Code: eng
        Text: English
    PhysicalDescription:
      Pagination:
        PageCount: 10
        StartPage: 78
    Titles:
      – TitleFull: CRAX: Software Crash Analysis for Automatic Exploit Generation by Modeling Attacks as Symbolic Continuations.
        Type: main
  BibRelationships:
    HasContributorRelationships:
      – PersonEntity:
          Name:
            NameFull: Huang, Shih-Kun
      – PersonEntity:
          Name:
            NameFull: Huang, Min-Hsiang
      – PersonEntity:
          Name:
            NameFull: Huang, Po-Yen
      – PersonEntity:
          Name:
            NameFull: Lai, Chung-Wei
      – PersonEntity:
          Name:
            NameFull: Lu, Han-Lin
      – PersonEntity:
          Name:
            NameFull: Leong, Wai-Meng
    IsPartOfRelationships:
      – BibEntity:
          Dates:
            – D: 01
              M: 01
              Text: 1/ 1/2012
              Type: published
              Y: 2012
          Identifiers:
            – Type: isbn-print
              Value: 9781467320672
          Titles:
            – TitleFull: 2012 IEEE Sixth International Conference on Software Security & Reliability
              Type: main
ResultId 1