Automated Attack Surface Approximation

被引:1
|
作者
Theisen, Christopher [1 ]
机构
[1] North Carolina State Univ, Dept Comp Sci, 890 Oval Dr,8206, Raleigh, NC 27695 USA
关键词
Stack traces; crash dumps; attack surface;
D O I
10.1145/2786805.2807563
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
While software systems are being developed and released to consumers more rapidly than ever, security remains an important issue for developers. Shorter development cycles means less time for these critical security testing and review efforts. The attack surface of a system is the sum of all paths for untrusted data into and out of a system. Code that lies on the attack surface therefore contains code with actual exploitable vulnerabilities. However, identifying code that lies on the attack surface requires the same contested security resources from the secure testing efforts themselves. My research proposes an automated technique to approximate attack surfaces through the analysis of stack traces. We hypothesize that stack traces user crashes represent activity that puts the system under stress, and is therefore indicative of potential security vulnerabilities. The goal of this research is to aid software engineers in prioritizing security efforts by approximating the attack surface of a system via stack trace analysis. In a trial on Mozilla Firefox, the attack surface approximation selected 8.4% of files and contained 72.1% of known vulnerabilities. A similar trial was performed on the Windows 8 product.
引用
收藏
页码:1063 / 1065
页数:3
相关论文
共 50 条
  • [41] Automated DDOS attack detection in software defined networking
    Ahuja, Nisha
    Singal, Gaurav
    Mukhopadhyay, Debajyoti
    Kumar, Neeraj
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 187 (187)
  • [42] Technical, legal and societal challenges to automated attack traceback
    Johns Hopkins Applied Physics Laboratory, United States
    不详
    IT Professional, 2002, 4 (03) : 12 - 18
  • [43] Automated software attack recovery using rollback and huddle
    Jesse Sathre
    Joseph Zambreno
    Design Automation for Embedded Systems, 2008, 12 : 243 - 260
  • [44] An Automated Multi-Tab Website Fingerprinting Attack
    Yin, Qilei
    Liu, Zhuotao
    Li, Qi
    Wang, Tao
    Wang, Qian
    Shen, Chao
    Xu, Yixiao
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (06) : 3656 - 3670
  • [45] An automated approach to generate Web applications attack scenarios
    Alata, Eric
    Kaaniche, Mohamed
    Nicomette, Vincent
    Akrout, Rim
    2013 SIXTH LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE COMPUTING (LADC), 2013, : 78 - 85
  • [46] Automated software attack recovery using rollback and huddle
    Sathre, Jesse
    Zambreno, Joseph
    DESIGN AUTOMATION FOR EMBEDDED SYSTEMS, 2008, 12 (03) : 243 - 260
  • [47] Taxonomy of software attack technique oriented to automated modeling
    Dept. of Computer Sci. and Technol., Northwest Univ., Xi'an
    710127, China
    不详
    710127, China
    不详
    710048, China
    Sichuan Daxue Xuebao (Gongcheng Kexue Ban), (91-98):
  • [48] Reduced Realistic Attack Plan Surface for Identification of Prioritized Attack Goals
    Smith, Jeffrey
    Figueroa, Michael
    2013 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2013, : 716 - 721
  • [49] Ck surface approximation from surface patches
    Gout, C
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2002, 44 (3-4) : 389 - 406
  • [50] A Network Attack Surface Evaluation Method Based on Optimal Attack Strategy
    Xie, Peng
    Zhang, Lin
    Lian, Zhichao
    Yang, Jianxin
    ELECTRONICS, 2025, 14 (02):