Automated Attack Surface Approximation

被引:1
|
作者
Theisen, Christopher [1 ]
机构
[1] North Carolina State Univ, Dept Comp Sci, 890 Oval Dr,8206, Raleigh, NC 27695 USA
关键词
Stack traces; crash dumps; attack surface;
D O I
10.1145/2786805.2807563
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
While software systems are being developed and released to consumers more rapidly than ever, security remains an important issue for developers. Shorter development cycles means less time for these critical security testing and review efforts. The attack surface of a system is the sum of all paths for untrusted data into and out of a system. Code that lies on the attack surface therefore contains code with actual exploitable vulnerabilities. However, identifying code that lies on the attack surface requires the same contested security resources from the secure testing efforts themselves. My research proposes an automated technique to approximate attack surfaces through the analysis of stack traces. We hypothesize that stack traces user crashes represent activity that puts the system under stress, and is therefore indicative of potential security vulnerabilities. The goal of this research is to aid software engineers in prioritizing security efforts by approximating the attack surface of a system via stack trace analysis. In a trial on Mozilla Firefox, the attack surface approximation selected 8.4% of files and contained 72.1% of known vulnerabilities. A similar trial was performed on the Windows 8 product.
引用
收藏
页码:1063 / 1065
页数:3
相关论文
共 50 条
  • [1] Reusing Stack Traces: Automated Attack Surface Approximation
    Theisen, Christopher
    2016 IEEE/ACM 38TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING COMPANION (ICSE-C), 2016, : 859 - 862
  • [2] Poster: Risk-Based Attack Surface Approximation
    Theisen, Christopher
    Williams, Laurie
    SYMPOSIUM AND BOOTCAMP ON THE SCIENCE OF SECURITY, 2016, : 121 - 123
  • [3] Automated reduction of attack surface using call graph enumeration
    Ando, Ruo
    PROCEEDINGS OF THE 2018 2ND INTERNATIONAL CONFERENCE ON MANAGEMENT ENGINEERING, SOFTWARE ENGINEERING AND SERVICE SCIENCES (ICMSS 2018), 2018, : 118 - 121
  • [4] Risk-Based Attack Surface Approximation: How Much Data is Enough?
    Theisen, Christopher
    Murphy, Brendan
    Herzig, Kim
    Williams, Laurie
    2017 IEEE/ACM 39TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: SOFTWARE ENGINEERING IN PRACTICE TRACK (ICSE-SEIP 2017), 2017, : 273 - 282
  • [5] Risk analysis of breakwater caisson under wave attack using load surface approximation
    Kim, Dong Hyawn
    CHINA OCEAN ENGINEERING, 2014, 28 (06) : 739 - 748
  • [7] Risk analysis of breakwater caisson under wave attack using load surface approximation
    Dong Hyawn Kim
    China Ocean Engineering, 2014, 28 : 739 - 748
  • [8] Automated generation of attack trees
    Vigo, Roberto
    Nielson, Flemming
    Nielson, Hanne Riis
    Proceedings of the Computer Security Foundations Workshop, 2014, 2014-January : 337 - 350
  • [9] Automated Generation of Attack Trees
    Vigo, Roberto
    Nielson, Flemming
    Nielson, Hanne Riis
    2014 IEEE 27TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2014, : 337 - 350
  • [10] Automated Simple Analysis Attack
    Kabin, Ievgen
    Dyka, Zoya
    Langendoerfer, Peter
    2020 9TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2020, : 214 - 217