Facilitating Vulnerability Assessment through PoC Migration

被引:7
|
作者
Dai, Jiarun [1 ]
Zhang, Yuan [1 ]
Xu, Hailong [1 ]
Lyu, Haiming [1 ]
Wu, Zicheng [1 ]
Xing, Xinyu [2 ]
Yang, Min [1 ]
机构
[1] Fudan Univ, Shanghai, Peoples R China
[2] Penn State Univ, University Pk, PA 16802 USA
来源
CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2021年
基金
上海市自然科学基金; 中国国家自然科学基金;
关键词
Vulnerability Assessment; Trace Alignment; PoC Adjustment; CODE; ROBUST;
D O I
10.1145/3460120.3484594
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent research shows that, even for vulnerability reports archived by MITRE/NIST, they usually contain incomplete information about the software's vulnerable versions, making users of under-reported vulnerable versions at risk. In this work, we address this problem by introducing a fuzzing-based method. Technically, this approach first collects the crashing trace on the reference version of the software. Then, it utilizes the trace to guide the mutation of the PoC input so that the target version could follow the trace similar to the one observed on the reference version. Under the mutated input, we argue that the target version's execution could have a higher chance of triggering the bug and demonstrating the vulnerability's existence. We implement this idea as an automated tool, named VULSCOPE. Using 30 real-world CVEs on 470 versions of software, VULSCOPE is demonstrated to introduce no false positives and only 7.9% false negatives while migrating PoC from one version to another. Besides, we also compare our method with two representative fuzzing tools AFL and AFLGO. We find VULSCOPE outperforms both of these existing techniques while taking the task of PoC migration. Finally, by using VULSCOPE, we identify 330 versions of software that MITRE/NIST fails to report as vulnerable.
引用
收藏
页码:3300 / 3317
页数:18
相关论文
共 50 条
  • [1] Economic Development through Migration: Facilitating Skilled Migration to China through the Belt and Road Initiative
    Richter, Eva L.
    CHINESE JOURNAL OF COMPARATIVE LAW, 2020, 8 (02): : 331 - 350
  • [2] Vulnerability assessment through mobile agents
    Mallah, GA
    Shaikh, ZA
    E-TECH 2004, 2004, : 92 - 96
  • [3] Aquifer vulnerability to pesticide migration through till aquitards
    Jorgensen, PR
    McKay, LD
    Kistrup, JP
    GROUND WATER, 2004, 42 (06) : 841 - 855
  • [4] Facilitating Student Learning in Accounting through Scaffolded Assessment
    Abraham, Anne
    Jones, Hazel
    ISSUES IN ACCOUNTING EDUCATION, 2016, 31 (01): : 29 - 49
  • [5] Vulnerability assessment through integrated transportation analysis
    Hood, JN
    Olivas, T
    Slocter, CB
    Howard, B
    Albright, DP
    TRANSPORTATION SECURITY AND INFRASTRUCTURE PROTECTION: SAFETY AND HUMAN PERFORMANCE, 2003, (1822): : 18 - 23
  • [6] Vulnerability assessment through integrated transportation analysis
    Hood, Jacqueline N.
    Olivas, Tim
    Slocter, Chuck B.
    Howard, Barry
    Albright, David P.
    Transportation Research Record, 2003, (1822) : 18 - 23
  • [7] Assessment of Flood Vulnerability Through a Multidimensional Index
    Gomez Vaca, Ana Noemi
    Rodriguez-Roda, Ignasi
    Abily, Morgan
    ADVANCES IN HYDROINFORMATICS, VOL 1, SIMHYDRO 2023, 2024, : 67 - 78
  • [8] Improving resilience through vulnerability assessment and management
    Agarwal, Jitendra
    CIVIL ENGINEERING AND ENVIRONMENTAL SYSTEMS, 2015, 32 (1-2) : 5 - 17
  • [10] Cities and migration: generative urban policies through contextual vulnerability
    Monno V.
    Serreli S.
    City, Territory and Architecture, 7 (1)