Automated Attack Surface Approximation

被引:1
|
作者
Theisen, Christopher [1 ]
机构
[1] North Carolina State Univ, Dept Comp Sci, 890 Oval Dr,8206, Raleigh, NC 27695 USA
关键词
Stack traces; crash dumps; attack surface;
D O I
10.1145/2786805.2807563
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
While software systems are being developed and released to consumers more rapidly than ever, security remains an important issue for developers. Shorter development cycles means less time for these critical security testing and review efforts. The attack surface of a system is the sum of all paths for untrusted data into and out of a system. Code that lies on the attack surface therefore contains code with actual exploitable vulnerabilities. However, identifying code that lies on the attack surface requires the same contested security resources from the secure testing efforts themselves. My research proposes an automated technique to approximate attack surfaces through the analysis of stack traces. We hypothesize that stack traces user crashes represent activity that puts the system under stress, and is therefore indicative of potential security vulnerabilities. The goal of this research is to aid software engineers in prioritizing security efforts by approximating the attack surface of a system via stack trace analysis. In a trial on Mozilla Firefox, the attack surface approximation selected 8.4% of files and contained 72.1% of known vulnerabilities. A similar trial was performed on the Windows 8 product.
引用
收藏
页码:1063 / 1065
页数:3
相关论文
共 50 条
  • [21] KoPA: Automated Kronecker Product Approximation
    Cai, Chencheng
    Chen, Rong
    Xiao, Han
    Journal of Machine Learning Research, 2022, 23
  • [22] Automated Computer Attack Detection in University Environment
    Svarc, Lukas
    Strnad, Pavel
    ACTA INFORMATICA PRAGENSIA, 2021, 10 (01) : 75 - 84
  • [23] Automated Generation of Attack Graphs Using NVD
    Aksu, M. Ugur
    Bicakci, Kemal
    Dilek, M. Hadi
    Ozbayoglu, A. Murat
    Tatli, E. Islam
    PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18), 2018, : 135 - 142
  • [24] Automated crowdturfing attack in Chinese user reviews
    Wang L.
    Guo X.
    Wang R.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (06): : 1 - 13
  • [25] DACA: Automated Attack Scenarios and Dataset Generation
    Korving, Frank
    Vaarandi, Risto
    PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY ICCWS, 2023, : 550 - 558
  • [26] Toward an automated attack model for red teams
    Ray, HT
    Vemuri, R
    Kantubhukta, HR
    IEEE SECURITY & PRIVACY, 2005, 3 (04) : 18 - 25
  • [27] Exploring the Prudent Limits of Automated Cyber Attack
    Caton, Jeffrey L.
    2013 5TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON), 2013,
  • [28] Automated Detection of Drive-by Download Attack
    Kikuchi, Hiroaki
    Matsumoto, Hiroaki
    Ishii, Hiroshi
    2015 9TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING IMIS 2015, 2015, : 511 - 515
  • [29] Diophantine approximation attack on a fast public key cryptosystem
    Wang Baocang
    Hu Yupu
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2006, 3903 : 25 - 32
  • [30] Bayesian Approximation Filtering With False Data Attack on Network
    Singh, Abhinoy Kumar
    Kumar, Sumit
    Kumar, Nagendra
    Radhakrishnan, Rahul
    IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS, 2022, 58 (02) : 976 - 988