CRAX: Software Crash Analysis for Automatic Exploit Generation by Modeling Attacks as Symbolic Continuations.
Saved in:
| Title: | CRAX: Software Crash Analysis for Automatic Exploit Generation by Modeling Attacks as Symbolic Continuations. |
|---|---|
| Authors: | Huang, Shih-Kun, Huang, Min-Hsiang, Huang, Po-Yen, Lai, Chung-Wei, Lu, Han-Lin, Leong, Wai-Meng |
| Source: | 2012 IEEE Sixth International Conference on Software Security & Reliability; 1/ 1/2012, p78-87, 10p |
| Abstract: | We present a simple framework capable of automatically generating attacks that exploit control flow hijacking vulnerabilities. We analyze given software crashes and perform symbolic execution in concolic mode, using a whole system environment model. The framework uses an end-to-end approach to generate exploits for various applications, including 16 medium scale benchmark programs, and several large scale applications, such as Mplayer (a media player), Unrar (an archiver) and Foxit(a pdf reader), with stack/heap overflow, off-by-one overflow, use of uninitialized variable, format string vulnerabilities. Notably, these applications have been typically regarded as fuzzing preys, but still require a manual process with security knowledge to produce mitigation-hardened exploits. Using our system to produce exploits is a fully automated and straightforward process for crashed software without source. We produce the exploits within six minutes for medium scale of programs, and as long as 80 minutes for mplayer (about 500,000 LOC), after constraint reductions. Our results demonstrate that the link between software bugs and security vulnerabilities can be automatically bridged. [ABSTRACT FROM PUBLISHER] |
| Copyright of 2012 IEEE Sixth International Conference on Software Security & Reliability is the property of IEEE and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.) | |
| Database: | Complementary Index |
| FullText | Text: Availability: 0 CustomLinks: – Url: https://resolver.ebscohost.com/openurl?sid=EBSCO:edb&genre=book&issn=&ISBN=9781467320672&volume=&issue=&date=&spage=78&pages=78-87&title=2012 IEEE Sixth International Conference on Software Security & Reliability&atitle=CRAX%3A%20Software%20Crash%20Analysis%20for%20Automatic%20Exploit%20Generation%20by%20Modeling%20Attacks%20as%20Symbolic%20Continuations.&aulast=Huang%2C%20Shih-Kun&id=DOI:10.1109/SERE.2012.20 Name: Full Text Finder Category: fullText Text: Full Text Finder Icon: https://imageserver.ebscohost.com/branding/images/FTF.gif MouseOverText: Full Text Finder |
|---|---|
| Header | DbId: edb DbLabel: Complementary Index An: 86572577 RelevancyScore: 849 AccessLevel: 6 PubType: Conference PubTypeId: conference PreciseRelevancyScore: 849.323059082031 |
| IllustrationInfo | |
| Items | – Name: Title Label: Title Group: Ti Data: CRAX: Software Crash Analysis for Automatic Exploit Generation by Modeling Attacks as Symbolic Continuations. – Name: Author Label: Authors Group: Au Data: <searchLink fieldCode="AR" term="%22Huang%2C+Shih-Kun%22">Huang, Shih-Kun</searchLink><br /><searchLink fieldCode="AR" term="%22Huang%2C+Min-Hsiang%22">Huang, Min-Hsiang</searchLink><br /><searchLink fieldCode="AR" term="%22Huang%2C+Po-Yen%22">Huang, Po-Yen</searchLink><br /><searchLink fieldCode="AR" term="%22Lai%2C+Chung-Wei%22">Lai, Chung-Wei</searchLink><br /><searchLink fieldCode="AR" term="%22Lu%2C+Han-Lin%22">Lu, Han-Lin</searchLink><br /><searchLink fieldCode="AR" term="%22Leong%2C+Wai-Meng%22">Leong, Wai-Meng</searchLink> – Name: TitleSource Label: Source Group: Src Data: 2012 IEEE Sixth International Conference on Software Security & Reliability; 1/ 1/2012, p78-87, 10p – Name: Abstract Label: Abstract Group: Ab Data: We present a simple framework capable of automatically generating attacks that exploit control flow hijacking vulnerabilities. We analyze given software crashes and perform symbolic execution in concolic mode, using a whole system environment model. The framework uses an end-to-end approach to generate exploits for various applications, including 16 medium scale benchmark programs, and several large scale applications, such as Mplayer (a media player), Unrar (an archiver) and Foxit(a pdf reader), with stack/heap overflow, off-by-one overflow, use of uninitialized variable, format string vulnerabilities. Notably, these applications have been typically regarded as fuzzing preys, but still require a manual process with security knowledge to produce mitigation-hardened exploits. Using our system to produce exploits is a fully automated and straightforward process for crashed software without source. We produce the exploits within six minutes for medium scale of programs, and as long as 80 minutes for mplayer (about 500,000 LOC), after constraint reductions. Our results demonstrate that the link between software bugs and security vulnerabilities can be automatically bridged. [ABSTRACT FROM PUBLISHER] – Name: Abstract Label: Group: Ab Data: <i>Copyright of 2012 IEEE Sixth International Conference on Software Security & Reliability is the property of IEEE and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract.</i> (Copyright applies to all Abstracts.) |
| PLink | https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edb&AN=86572577 |
| RecordInfo | BibRecord: BibEntity: Identifiers: – Type: doi Value: 10.1109/SERE.2012.20 Languages: – Code: eng Text: English PhysicalDescription: Pagination: PageCount: 10 StartPage: 78 Titles: – TitleFull: CRAX: Software Crash Analysis for Automatic Exploit Generation by Modeling Attacks as Symbolic Continuations. Type: main BibRelationships: HasContributorRelationships: – PersonEntity: Name: NameFull: Huang, Shih-Kun – PersonEntity: Name: NameFull: Huang, Min-Hsiang – PersonEntity: Name: NameFull: Huang, Po-Yen – PersonEntity: Name: NameFull: Lai, Chung-Wei – PersonEntity: Name: NameFull: Lu, Han-Lin – PersonEntity: Name: NameFull: Leong, Wai-Meng IsPartOfRelationships: – BibEntity: Dates: – D: 01 M: 01 Text: 1/ 1/2012 Type: published Y: 2012 Identifiers: – Type: isbn-print Value: 9781467320672 Titles: – TitleFull: 2012 IEEE Sixth International Conference on Software Security & Reliability Type: main |
| ResultId | 1 |
Full Text Finder