SAEG: Stateful Automatic Exploit Generation

被引:0
|
作者
Wu, Yifan [1 ]
Li, Yinshuai [1 ]
Zhu, Hong [1 ]
Zhang, Yinqian [1 ]
机构
[1] Southern Univ Sci & Technol, Res Inst Trustworthy Autonomous Syst, Dept Comp Sci & Engn, Shenzhen, Peoples R China
来源
COMPUTER SECURITY-ESORICS 2024, PT IV | 2024年 / 14985卷
关键词
Automatic Exploit Generation; Symbolic Execution; Vulnerability;
D O I
10.1007/978-3-031-70903-6_7
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The field of Automatic Exploit Generation (AEG) plays a pivotal role in the assessment of software vulnerabilities, automating the analysis for exploit creation. Although AEG systems are instrumental in probing for vulnerabilities, they often lack the capability to contend with defense mechanisms such as vulnerability mitigation, which are commonly deployed in target environments. This shortfall presents significant challenges in exploitation. Additionally, most frameworks are tailored to specific vulnerabilities, rendering their extension a complex process that necessitates in-depth familiarity with their architectures. To overcome these limitations, we introduce the SAEG framework, which streamlines the repetitious aspects of existing exploit templates through a modular and extensible state machine that builds upon the concept of an Exploit Graph. SAEG can methodically filter out impractical exploitation paths by utilizing current information and the target program's state. Additionally, it simplifies the integration of new information leakage methods with minimal overhead and handles multi-step exploitation procedures, including those requiring the leakage of sensitive data. We demonstrate a prototype of SAEG founded on symbolic execution that can simultaneously explore heap and stack vulnerabilities. This prototype can explore and combine leakage and exploitation effectively, generating complete exploits to obtain shell access for binary files across i386 and x86_64 architectures.
引用
收藏
页码:127 / 145
页数:19
相关论文
共 50 条
  • [1] Automatic Exploit Generation
    Avgerinos, Thanassis
    Cha, Sang Kil
    Rebert, Alexandre
    Schwartz, Edward J.
    Woo, Maverick
    Brumley, David
    COMMUNICATIONS OF THE ACM, 2014, 57 (02) : 74 - 84
  • [2] Automatic Exploit Generation for Buffer Overflow Vulnerabilities
    Xu, Luhang
    Jia, Weixi
    Dong, Wei
    Li, Yongjun
    2018 IEEE 18TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C), 2018, : 463 - 468
  • [3] Automatic Polymorphic Exploit Generation for Software Vulnerabilities
    Wang, Minghua
    Su, Purui
    Li, Qi
    Ying, Lingyun
    Yang, Yi
    Feng, Dengguo
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2013, 2013, 127 : 216 - +
  • [4] An Automatic Exploit Generation Method Based on Symbolic Execution
    Fang Hao
    Fen-Wenbo
    Fu-Menglin
    2018 EIGHTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2018), 2018, : 437 - 440
  • [5] Software Crash Analysis for Automatic Exploit Generation on Binary Programs
    Huang, Shih-Kun
    Huang, Min-Hsiang
    Huang, Po-Yen
    Lu, Han-Lin
    Lai, Chung-Wei
    IEEE TRANSACTIONS ON RELIABILITY, 2014, 63 (01) : 270 - 289
  • [6] FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities
    Park, Sunnyeo
    Kim, Daejun
    Jana, Suman
    Son, Sooel
    PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 197 - 214
  • [7] Automatic patch-based exploit generation is possible: Techniques and implications
    Brumley, David
    Poosankam, Pongsin
    Song, Dawn
    Zheng, Jiang
    PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2008, : 143 - +
  • [8] Automatic Generation of Tests to Exploit XML Injection Vulnerabilities in Web Applications
    Jan, Sadeeq
    Panichella, Annibale
    Arcuri, Andrea
    Briand, Lionel
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2019, 45 (04) : 335 - 362
  • [9] Pain Pickle: Bypassing Python']Python Restricted Unpickler for Automatic Exploit Generation
    Huang, Nan-Jung
    Huang, Chih-Jen
    Huang, Shih-Kun
    2022 IEEE 22ND INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY, QRS, 2022, : 1079 - 1090
  • [10] AAHEG: Automatic Advanced Heap Exploit Generation Based on Abstract Syntax Tree
    Wang, Yu
    Zhang, Yipeng
    Li, Zhoujun
    SYMMETRY-BASEL, 2023, 15 (12):