LAVA: Large-scale Automated Vulnerability Addition

被引:201
|
作者
Dolan-Gavitt, Brendan [1 ]
Hulin, Patrick [2 ]
Kirda, Engin [3 ]
Leek, Tim [2 ]
Mambretti, Andrea [3 ]
Robertson, Wil [3 ]
Ulrich, Frederick [2 ]
Whelan, Ryan [2 ]
机构
[1] NYU, New York, NY 10003 USA
[2] MIT, Lincoln Lab, Cambridge, MA 02139 USA
[3] Northeastern Univ, Boston, MA USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/SP.2016.15
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Work on automating vulnerability discovery has long been hampered by a shortage of ground-truth corpora with which to evaluate tools and techniques. This lack of ground truth prevents authors and users of tools alike from being able to measure such fundamental quantities as miss and false alarm rates. In this paper, we present LAVA, a novel dynamic taint analysis-based technique for producing ground-truth corpora by quickly and automatically injecting large numbers of realistic bugs into program source code. Every LAVA bug is accompanied by an input that triggers it whereas normal inputs are extremely unlikely to do so. These vulnerabilities are synthetic but, we argue, still realistic, in the sense that they are embedded deep within programs and are triggered by real inputs. Using LAVA, we have injected thousands of bugs into eight real-world programs, including bash, tshark, and the GNU coreutils. In a preliminary evaluation, we found that a prominent fuzzer and a symbolic execution-based bug finder were able to locate some but not all LAVA-injected bugs, and that interesting patterns and pathologies were already apparent in their performance. Our work forms the basis of an approach for generating large ground-truth vulnerability corpora on demand, enabling rigorous tool evaluation and providing a high-quality target for tool developers.
引用
收藏
页码:110 / 121
页数:12
相关论文
共 50 条
  • [21] Automated mapping of large-scale chromatin structure in ENCODE
    Lian, Heng
    Thompson, William A.
    Thurman, Robert
    Stamatoyannopoulos, John A.
    Noble, William Stafford
    Lawrence, Charles E.
    BIOINFORMATICS, 2008, 24 (17) : 1911 - 1916
  • [22] QuaSR: A large-scale automated, distributed testing environment
    Grady, S
    Madhusudan, GS
    Sugiyama, M
    PROCEEDINGS OF THE FOURTH ANNUAL TCL/TK WORKSHOP, 1996, : 61 - 68
  • [23] Automated parametric execution and documentation for large-scale simulations
    Kelsey, RL
    Bisset, KR
    Webster, RB
    ENABLING TECHNOLOGY FOR SIMULATION SCIENCE V, 2001, 4367 : 202 - 208
  • [24] Automated Detection of Load Changes in Large-Scale Networks
    Mata, Felipe
    Aracil, Javier
    Luis Garcia-Dorado, Jose
    TRAFFIC MONITORING AND ANALYSIS: FIRST INTERNATIONAL WORKSHOP, TMA 2009, 2009, 5537 : 34 - 41
  • [25] Urban road network vulnerability and resilience to large-scale attacks
    Vivek, Skanda
    Conner, Hannah
    SAFETY SCIENCE, 2022, 147
  • [26] Large-Scale Study of Vulnerability Scanners for Ethereum Smart Contracts
    Sendner, Christoph
    Petzi, Lukas
    Stang, Jasper
    Dmitrienko, Alexandra
    45TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP 2024, 2024, : 2273 - 2290
  • [27] Large-scale assessment of landslide hazard, vulnerability and risk in China
    Liu, Xilin
    Miao, Cheng
    GEOMATICS NATURAL HAZARDS & RISK, 2018, 9 (01) : 1037 - 1052
  • [28] Automated Debriefing: Interface for Large-Scale Research Ethics
    Zong, Jonathan
    Matias, J. Nathan
    COMPANION OF THE 2018 ACM CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK AND SOCIAL COMPUTING (CSCW'18), 2018, : 21 - 24
  • [29] Automated sequence preprocessing in a large-scale sequencing environment
    Wendl, MC
    Dear, S
    Hodgson, D
    Hillier, L
    GENOME RESEARCH, 1998, 8 (09): : 975 - 984
  • [30] Automated VARTM processing of large-scale composite structures
    Heider, Dirk
    Gillespie Jr., J.W.
    1600, Soc. for the Advancement of Material and Process Engineering (36):