SAEG: Stateful Automatic Exploit Generation

被引:0
|
作者
Wu, Yifan [1 ]
Li, Yinshuai [1 ]
Zhu, Hong [1 ]
Zhang, Yinqian [1 ]
机构
[1] Southern Univ Sci & Technol, Res Inst Trustworthy Autonomous Syst, Dept Comp Sci & Engn, Shenzhen, Peoples R China
来源
COMPUTER SECURITY-ESORICS 2024, PT IV | 2024年 / 14985卷
关键词
Automatic Exploit Generation; Symbolic Execution; Vulnerability;
D O I
10.1007/978-3-031-70903-6_7
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The field of Automatic Exploit Generation (AEG) plays a pivotal role in the assessment of software vulnerabilities, automating the analysis for exploit creation. Although AEG systems are instrumental in probing for vulnerabilities, they often lack the capability to contend with defense mechanisms such as vulnerability mitigation, which are commonly deployed in target environments. This shortfall presents significant challenges in exploitation. Additionally, most frameworks are tailored to specific vulnerabilities, rendering their extension a complex process that necessitates in-depth familiarity with their architectures. To overcome these limitations, we introduce the SAEG framework, which streamlines the repetitious aspects of existing exploit templates through a modular and extensible state machine that builds upon the concept of an Exploit Graph. SAEG can methodically filter out impractical exploitation paths by utilizing current information and the target program's state. Additionally, it simplifies the integration of new information leakage methods with minimal overhead and handles multi-step exploitation procedures, including those requiring the leakage of sensitive data. We demonstrate a prototype of SAEG founded on symbolic execution that can simultaneously explore heap and stack vulnerabilities. This prototype can explore and combine leakage and exploitation effectively, generating complete exploits to obtain shell access for binary files across i386 and x86_64 architectures.
引用
收藏
页码:127 / 145
页数:19
相关论文
共 50 条
  • [21] Automated exploit generation for stack buffer overflow vulnerabilities
    Padaryan, V. A.
    Kaushan, V. V.
    Fedotov, A. N.
    PROGRAMMING AND COMPUTER SOFTWARE, 2015, 41 (06) : 373 - 380
  • [22] Automated exploit generation for stack buffer overflow vulnerabilities
    V. A. Padaryan
    V. V. Kaushan
    A. N. Fedotov
    Programming and Computer Software, 2015, 41 : 373 - 380
  • [23] Testing Detector Parameterization Using Evolutionary Exploit Generation
    Kayacik, Hilmi G.
    Zincir-Heywood, A. Nur
    Heywood, Malcolm I.
    Burschka, Stefan
    APPLICATIONS OF EVOLUTIONARY COMPUTING, PROCEEDINGS, 2009, 5484 : 105 - +
  • [24] Automatic discovery of stateful variables in network protocol software based on replay analysis
    Huang, Jianxin
    Yu, Bo
    Liu, Runhao
    Su, Jinshu
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2023, 24 (03) : 403 - 416
  • [25] Automatic Software Vulnerability Discovery and Exploit Under the Limited Resource Conditions
    Huang H.
    Wang J.
    Yang Y.
    Su P.
    Nie C.
    Xin W.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (11): : 2299 - 2314
  • [26] Survey of Methods for Automated Code-Reuse Exploit Generation
    Vishnyakov, A. V.
    Nurmukhametov, A. R.
    PROGRAMMING AND COMPUTER SOFTWARE, 2021, 47 (04) : 271 - 297
  • [27] Gollum: Modular and Greybox Exploit Generation for Heap Overflows in Interpreters
    Heelan, Sean
    Melham, Tom
    Kroening, Daniel
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 1689 - 1706
  • [28] Chainsaw: Chained Automated Workflow-based Exploit Generation
    Alhuzali, Abeer
    Eshete, Birhanu
    Gjomemo, Rigel
    Venkatakrishnan, V. N.
    CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 641 - 652
  • [29] Oracle-Supported Dynamic Exploit Generation for Smart Contracts
    Wang, Haijun
    Liu, Ye
    Li, Yi
    Lin, Shang-Wei
    Artho, Cyrille
    Ma, Lei
    Liu, Yang
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 1795 - 1809
  • [30] ERACE: Toward Facilitating Exploit Generation for Kernel Race Vulnerabilities
    Liu, Danjun
    Wang, Pengfei
    Zhou, Xu
    Wang, Baosheng
    APPLIED SCIENCES-BASEL, 2022, 12 (23):