Facilitating Vulnerability Assessment through PoC Migration

被引:7
|
作者
Dai, Jiarun [1 ]
Zhang, Yuan [1 ]
Xu, Hailong [1 ]
Lyu, Haiming [1 ]
Wu, Zicheng [1 ]
Xing, Xinyu [2 ]
Yang, Min [1 ]
机构
[1] Fudan Univ, Shanghai, Peoples R China
[2] Penn State Univ, University Pk, PA 16802 USA
来源
CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2021年
基金
上海市自然科学基金; 中国国家自然科学基金;
关键词
Vulnerability Assessment; Trace Alignment; PoC Adjustment; CODE; ROBUST;
D O I
10.1145/3460120.3484594
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent research shows that, even for vulnerability reports archived by MITRE/NIST, they usually contain incomplete information about the software's vulnerable versions, making users of under-reported vulnerable versions at risk. In this work, we address this problem by introducing a fuzzing-based method. Technically, this approach first collects the crashing trace on the reference version of the software. Then, it utilizes the trace to guide the mutation of the PoC input so that the target version could follow the trace similar to the one observed on the reference version. Under the mutated input, we argue that the target version's execution could have a higher chance of triggering the bug and demonstrating the vulnerability's existence. We implement this idea as an automated tool, named VULSCOPE. Using 30 real-world CVEs on 470 versions of software, VULSCOPE is demonstrated to introduce no false positives and only 7.9% false negatives while migrating PoC from one version to another. Besides, we also compare our method with two representative fuzzing tools AFL and AFLGO. We find VULSCOPE outperforms both of these existing techniques while taking the task of PoC migration. Finally, by using VULSCOPE, we identify 330 versions of software that MITRE/NIST fails to report as vulnerable.
引用
收藏
页码:3300 / 3317
页数:18
相关论文
共 50 条
  • [21] Drinking water vulnerability assessment after disinfection through chlorine
    Di Cristo, C.
    Leopardi, A.
    Quintiliani, C.
    de Marinis, G.
    COMPUTING AND CONTROL FOR THE WATER INDUSTRY (CCWI2015): SHARING THE BEST PRACTICE IN WATER MANAGEMENT, 2015, 119 : 389 - 397
  • [22] Vulnerability Assessment for Applications Security Through Penetration Simulation and Testing
    Lachkov, Petar
    Tawalbeh, Lo'ai
    Bhatt, Smriti
    JOURNAL OF WEB ENGINEERING, 2022, 21 (07): : 2187 - 2208
  • [23] Migration-Facilitating Capital: A Bourdieusian Theory of International Migration
    Kim, Jaeeun
    SOCIOLOGICAL THEORY, 2018, 36 (03) : 262 - 288
  • [24] Upregulation of FOXP4 in breast cancer promotes migration and invasion through facilitating EMT
    Ma, Tao
    Zhang, Jin
    CANCER MANAGEMENT AND RESEARCH, 2019, 11 : 2783 - 2793
  • [25] Upregulation of LSD1 promotes migration and invasion in gastric cancer through facilitating EMT
    Zhang, Jin
    Zhao, Donghui
    Li, Qingjun
    Du, Xiuluan
    Liu, Yanxiang
    Dai, Xin
    Hong, Lianqing
    CANCER MANAGEMENT AND RESEARCH, 2019, 11 : 4481 - 4491
  • [26] Assessment of Urban Neighbourhoods' Vulnerability through an Integrated Vulnerability Index (IVI): Evidence from Barcelona, Spain
    Piasek, Gonzalo
    Aragon, Iraide Fernandez
    Shershneva, Julia
    Garcia-Almirall, Pilar
    SOCIAL SCIENCES-BASEL, 2022, 11 (10):
  • [27] RoBin: Facilitating the Reproduction of Configuration-Related Vulnerability
    Chen, Ligeng
    Guo, Jian
    He, Zhongling
    Mu, Dongliang
    Mao, Bing
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 91 - 98
  • [28] From prior learning assessment to specialised pedagogy: facilitating student transition through RPL assessment and selection
    Brenner, Aimee
    Goodman, Suki
    Meadows, Alison
    Cooper, Linda
    STUDIES IN CONTINUING EDUCATION, 2022, 44 (03) : 425 - 440
  • [29] CLIMATE VULNERABILITY Drivers of migration
    Graffeo, Michele
    NATURE CLIMATE CHANGE, 2017, 7 (02) : 96 - 96
  • [30] Assessment of prey vulnerability through analysis of wolf movements and kill sites
    Bergman, EJ
    Garrott, RA
    Creel, S
    Borkowski, JJ
    Jaffe, R
    Watson, EGR
    ECOLOGICAL APPLICATIONS, 2006, 16 (01) : 273 - 284