SAEG: Stateful Automatic Exploit Generation

被引:0
|
作者
Wu, Yifan [1 ]
Li, Yinshuai [1 ]
Zhu, Hong [1 ]
Zhang, Yinqian [1 ]
机构
[1] Southern Univ Sci & Technol, Res Inst Trustworthy Autonomous Syst, Dept Comp Sci & Engn, Shenzhen, Peoples R China
来源
COMPUTER SECURITY-ESORICS 2024, PT IV | 2024年 / 14985卷
关键词
Automatic Exploit Generation; Symbolic Execution; Vulnerability;
D O I
10.1007/978-3-031-70903-6_7
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The field of Automatic Exploit Generation (AEG) plays a pivotal role in the assessment of software vulnerabilities, automating the analysis for exploit creation. Although AEG systems are instrumental in probing for vulnerabilities, they often lack the capability to contend with defense mechanisms such as vulnerability mitigation, which are commonly deployed in target environments. This shortfall presents significant challenges in exploitation. Additionally, most frameworks are tailored to specific vulnerabilities, rendering their extension a complex process that necessitates in-depth familiarity with their architectures. To overcome these limitations, we introduce the SAEG framework, which streamlines the repetitious aspects of existing exploit templates through a modular and extensible state machine that builds upon the concept of an Exploit Graph. SAEG can methodically filter out impractical exploitation paths by utilizing current information and the target program's state. Additionally, it simplifies the integration of new information leakage methods with minimal overhead and handles multi-step exploitation procedures, including those requiring the leakage of sensitive data. We demonstrate a prototype of SAEG founded on symbolic execution that can simultaneously explore heap and stack vulnerabilities. This prototype can explore and combine leakage and exploitation effectively, generating complete exploits to obtain shell access for binary files across i386 and x86_64 architectures.
引用
收藏
页码:127 / 145
页数:19
相关论文
共 50 条
  • [31] Survey of Methods for Automated Code-Reuse Exploit Generation
    A. V. Vishnyakov
    A. R. Nurmukhametov
    Programming and Computer Software, 2021, 47 : 271 - 297
  • [32] Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation
    Wang, Xinyi
    Zhang, Cen
    Li, Yeting
    Xu, Zhiwu
    Huang, Shuailin
    Liu, Yi
    Yao, Yican
    Xiao, Yang
    Zou, Yanyan
    Liu, Yang
    Huo, Wei
    2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 2427 - 2443
  • [33] NAVEX: Precise and Scalable Exploit Generation for Dynamic Web Applications
    Alhuzali, Abeer
    Gjomemo, Rigel
    Eshete, Birhanu
    Venkatakrishnan, V. N.
    PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, 2018, : 377 - 392
  • [34] SIoTFuzzer: Fuzzing Web Interface in IoT Firmware via Stateful Message Generation
    Zhang, Hangwei
    Lu, Kai
    Zhou, Xu
    Yin, Qidi
    Wang, Pengfei
    Yue, Tai
    APPLIED SCIENCES-BASEL, 2021, 11 (07):
  • [35] Semi-valid Fuzz Testing Case Generation for Stateful Network Protocol
    Rui Ma
    Shuaimin Ren
    Ke Ma
    Changzhen Hu
    Jingfeng Xue
    Tsinghua Science and Technology, 2017, 22 (05) : 458 - 468
  • [36] Semi-valid Fuzz Testing Case Generation for Stateful Network Protocol
    Ma, Rui
    Ren, Shuaimin
    Ma, Ke
    Hu, Changzhen
    Xue, Jingfeng
    TSINGHUA SCIENCE AND TECHNOLOGY, 2017, 22 (05) : 458 - 468
  • [37] Automatic compilation of loops to exploit operator parallelism on configurable arithmetic logic units
    Ramasubramanian, N
    Subramanian, R
    Pande, S
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2002, 13 (01) : 45 - 66
  • [38] Automatic topology generation
    Eiseman, PR
    Rajagopalan, K
    New Developments in Computational Fluid Dynamics, 2005, 90 : 112 - 124
  • [39] Automatic form generation
    Mamrak, SA
    Pole, S
    SOFTWARE-PRACTICE & EXPERIENCE, 2002, 32 (11): : 1051 - 1063
  • [40] AUTOMATIC TEXT GENERATION
    MARSH, R
    BRITISH TELECOM TECHNOLOGY JOURNAL, 1988, 6 (04): : 84 - 88