AAHEG: Automatic Advanced Heap Exploit Generation Based on Abstract Syntax Tree

被引:0
|
作者
Wang, Yu [1 ]
Zhang, Yipeng [2 ]
Li, Zhoujun [1 ]
机构
[1] Beihang Univ, State Key Lab Software Dev Environm, Beijing 100191, Peoples R China
[2] North China Univ Technol, Sch Informat Sci & Technol, Beijing 100144, Peoples R China
来源
SYMMETRY-BASEL | 2023年 / 15卷 / 12期
基金
中国国家自然科学基金;
关键词
automatic exploit generation; heap-related vulnerability; fuzzing; symbolic execution; abstract syntax tree;
D O I
10.3390/sym15122197
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Automatic Exploit Generation (AEG) involves automatically discovering paths in a program that trigger vulnerabilities, thereby generating exploits. While there is considerable research on heap-related vulnerability detection, such as detecting Heap Overflow and Use After Free (UAF) vulnerabilities, among contemporary heap-automated exploit techniques, only certain automated exploit techniques can hijack program control flow to the shellcode. An important limitation of this approach is that it cannot effectively bypass Linux's protection mechanisms. To solve this problem, we introduced Automatic Advanced Heap Exploit Generation (AAHEG). It first applies symbolic execution to analyze heap-related primitives in files and then detects potential heap-related vulnerabilities without a source code. After identifying these vulnerabilities, AAHEG builds an exploit abstract syntax tree (AST) to identify one or more successful exploit strategies, such as fast bin attack and Safe-unlink. AAHEG then selects exploitable methods via an abstract syntax tree (AST) and performs final testing to produce the final exploit. AAHEG chose to generate advanced heap-related exploits because the exploits can bypass Linux protections. Basically, AAHEG can automatically detect heap-related vulnerabilities in binaries without source code, build an exploit AST, choose from a variety of advanced heap exploit methods, bypass all Linux protection mechanisms, and generate final file-form exploit based on pwntools which can pass local and remote testing. Experimental results show that AAHEG successfully completed vulnerability detection and exploit generation for 20 Capture The Flag (CTF) binary files, 11 of which have all protection mechanisms enabled.
引用
收藏
页数:22
相关论文
共 50 条
  • [1] The Metric for Automatic Code Generation Based on Dynamic Abstract Syntax Tree
    Yao, Wenjun
    Jiang, Ying
    Yang, Yang
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2023, 15 (01)
  • [2] Programming Hints Generation based on Abstract Syntax Tree Retrieval
    Wan, Han
    Luo, Hongzhen
    Zhong, Zihao
    Gao, Xiaopeng
    2022 IEEE FRONTIERS IN EDUCATION CONFERENCE, FIE, 2022,
  • [3] ATOM: Commit Message Generation Based on Abstract Syntax Tree and Hybrid Ranking
    Liu, Shangqing
    Gao, Cuiyun
    Chen, Sen
    Nie, Lun Yiu
    Liu, Yang
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2022, 48 (05) : 1800 - 1817
  • [4] Static code detection based on abstract syntax tree
    Lu, Xiaofeng
    Fang, Denghui
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2019, 125 : 195 - 195
  • [5] Automatic Equivalent Mutants Classification Using Abstract Syntax Tree Neural Networks
    Peacock, Samuel
    Deng, Lin
    Dehlinger, Josh
    Chakraborty, Suranjan
    2021 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW 2021), 2021, : 13 - 18
  • [6] Boosting Symbolic Execution for Heap-based Vulnerability Detection and Exploit Generation
    Tu, Haoxin
    2023 IEEE/ACM 45TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: COMPANION PROCEEDINGS, ICSE-COMPANION, 2023, : 218 - 220
  • [7] A Program Plagiarism Detection Approach Based On Abstract Syntax Tree
    Xiong, Hao
    Yan, Hai-hua
    Li, Zhou-jun
    Li, Hu
    ICAIE 2009: PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND EDUCATION, VOLS 1 AND 2, 2009, : 196 - 205
  • [8] Clone detection algorithm based on the Abstract Syntax Tree approach
    Lazar, Flavius-Mihai
    Banias, Ovidiu
    2014 IEEE 9TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS (SACI), 2014, : 73 - 78
  • [9] An Automatic Exploit Generation Method Based on Symbolic Execution
    Fang Hao
    Fen-Wenbo
    Fu-Menglin
    2018 EIGHTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2018), 2018, : 437 - 440
  • [10] Source Code Plagiarism Detection Based on Abstract Syntax Tree Fingerprintings
    Suttichaya, Vasin
    Eakvorachai, Niracha
    Lurkraisit, Tunchanok
    2022 17TH INTERNATIONAL JOINT SYMPOSIUM ON ARTIFICIAL INTELLIGENCE AND NATURAL LANGUAGE PROCESSING (ISAI-NLP 2022) / 3RD INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INTERNET OF THINGS (AIOT 2022), 2022,