Automatic Polymorphic Exploit Generation for Software Vulnerabilities

被引:0
|
作者
Wang, Minghua [1 ]
Su, Purui [1 ]
Li, Qi [2 ]
Ying, Lingyun [1 ]
Yang, Yi [1 ]
Feng, Dengguo [1 ]
机构
[1] Chinese Acad Sci, Inst Software, Trusted Comp & Informat Assurance Lab, Beijing 100190, Peoples R China
[2] ETH, Inst Informat Security, Zurich, Switzerland
基金
中国国家自然科学基金;
关键词
software vulnerability; dynamic taint analysis; exploit generation;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Generating exploits from the perspective of attackers is an effective approach towards severity analysis of known vulnerabilities. However, it remains an open problem to generate even one exploit using a program binary and a known abnormal input that crashes the program, not to mention multiple exploits. To address this issue, in this paper, we propose PolyAEG, a system that automatically generates multiple exploits for a vulnerable program using one corresponding abnormal input. To generate polymorphic exploits, we fully leverage different trampoline instructions to hijack control flow and redirect it to malicious code in the execution context. We demonstrate that, given a vulnerable program and one of its abnormal inputs, our system can generate polymorphic exploits for the program. We have successfully generated control flow hijacking exploits for 8 programs in our experiment. Particularly, we have generated 4,724 exploits using only one abnormal input for Irfan View, a widely used picture viewer.
引用
收藏
页码:216 / +
页数:3
相关论文
共 50 条
  • [1] Automatic Exploit Generation for Buffer Overflow Vulnerabilities
    Xu, Luhang
    Jia, Weixi
    Dong, Wei
    Li, Yongjun
    2018 IEEE 18TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C), 2018, : 463 - 468
  • [2] FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities
    Park, Sunnyeo
    Kim, Daejun
    Jana, Suman
    Son, Sooel
    PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 197 - 214
  • [3] Automatic Generation of Tests to Exploit XML Injection Vulnerabilities in Web Applications
    Jan, Sadeeq
    Panichella, Annibale
    Arcuri, Andrea
    Briand, Lionel
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2019, 45 (04) : 335 - 362
  • [4] Software Crash Analysis for Automatic Exploit Generation on Binary Programs
    Huang, Shih-Kun
    Huang, Min-Hsiang
    Huang, Po-Yen
    Lu, Han-Lin
    Lai, Chung-Wei
    IEEE TRANSACTIONS ON RELIABILITY, 2014, 63 (01) : 270 - 289
  • [5] Automatic Exploit Generation
    Avgerinos, Thanassis
    Cha, Sang Kil
    Rebert, Alexandre
    Schwartz, Edward J.
    Woo, Maverick
    Brumley, David
    COMMUNICATIONS OF THE ACM, 2014, 57 (02) : 74 - 84
  • [6] Automated exploit generation for stack buffer overflow vulnerabilities
    Padaryan, V. A.
    Kaushan, V. V.
    Fedotov, A. N.
    PROGRAMMING AND COMPUTER SOFTWARE, 2015, 41 (06) : 373 - 380
  • [7] Automated exploit generation for stack buffer overflow vulnerabilities
    V. A. Padaryan
    V. V. Kaushan
    A. N. Fedotov
    Programming and Computer Software, 2015, 41 : 373 - 380
  • [8] SAEG: Stateful Automatic Exploit Generation
    Wu, Yifan
    Li, Yinshuai
    Zhu, Hong
    Zhang, Yinqian
    COMPUTER SECURITY-ESORICS 2024, PT IV, 2024, 14985 : 127 - 145
  • [9] ERACE: Toward Facilitating Exploit Generation for Kernel Race Vulnerabilities
    Liu, Danjun
    Wang, Pengfei
    Zhou, Xu
    Wang, Baosheng
    APPLIED SCIENCES-BASEL, 2022, 12 (23):
  • [10] Reversing Kia Motors Head Unit to discover and exploit software vulnerabilities
    Costantino, Gianpiero
    Matteucci, Ilaria
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2023, 19 (01) : 33 - 49