Pangr: A Behavior-based Automatic Vulnerability Detection and Exploitation Framework

被引:6
|
作者
Liu, Danjun [1 ]
Wang, Jingyuan [1 ]
Rong, Zelin [1 ]
Mi, Xianya [1 ]
Gai, Fangyu [1 ]
Yong, Tang [1 ]
Wang, Baosheng [1 ]
机构
[1] Natl Univ Def & Technol, Coll Comp, Changsha, Hunan, Peoples R China
基金
中国国家自然科学基金;
关键词
automatic detection; automatic exploit generation; software security; automatic patching;
D O I
10.1109/TrustCom/BigDataSE.2018.00103
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, with the size and complexity of software increasing rapidly, vulnerabilities are becoming diversified and hard to identify. It is unpractical to detect and exploit vulnerabilities by manual construction. Therefore, an efficient automatic method of detecting and exploiting software vulnerability is in critical demand. This paper implements Pangr, an entire system for automatic vulnerability detection, exploitation, and patching. Pangr builds a complete vulnerability model based on its triggering behavior to identify vulnerabilities and generate exp or exploit schemes. According to the type and feature of the vulnerability, Pangr can generate the specific patch for the software. In the experiment, we tested 20 vulnerable programs on 32-bit Linux machine. Pangr detected 16 vulnerabilities, generated 10 exp, and patched 14 programs.
引用
收藏
页码:705 / 712
页数:8
相关论文
共 50 条
  • [21] A behavior-based framework for safe deployment of humanoid robots
    Nicola Scianca
    Paolo Ferrari
    Daniele De Simone
    Leonardo Lanari
    Giuseppe Oriolo
    Autonomous Robots, 2021, 45 : 435 - 456
  • [22] WiP: Behavior-based Service Change Detection
    Jahl, Alexander
    Huu Tam Tran
    Baraki, Harun
    Geihs, Kurt
    2018 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP 2018), 2018, : 267 - 269
  • [23] Behavior-based Worm Detection and Signature Generation
    Yao, Yu
    Lv, Junwei
    Gao, Fuxiang
    Zhang, Yanfang
    Yu, Ge
    2008 INTERNATIONAL MULTISYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS), 2008, : 124 - 131
  • [24] On Behavior-based Detection of Malware on Android Platform
    Yu, Wei
    Zhang, Hanlin
    Ge, Linqiang
    Hardy, Rommie
    2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 814 - 819
  • [25] A review on behavior-based detection for network threats
    Sun, Xin
    Wang, Zixiang
    Lv, Bang
    Ou, Jing
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY, IEEE 3RD INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 2ND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2017, : 127 - 132
  • [26] Securing Behavior-based Opinion Spam Detection
    Ge, Shuaijun
    Ma, Guixiang
    Xie, Sihong
    Yu, Philip S.
    2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2018, : 112 - 117
  • [27] Behavior-Based Twitter Overlapping Community Detection
    Guo, Lixiang
    Ding, Zhaoyun
    Wang, Hui
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, DASFAA 2016, 2016, 9645 : 371 - 376
  • [28] A behavior-based framework for safe deployment of humanoid robots
    Scianca, Nicola
    Ferrari, Paolo
    De Simone, Daniele
    Lanari, Leonardo
    Oriolo, Giuseppe
    AUTONOMOUS ROBOTS, 2021, 45 (04) : 435 - 456
  • [29] AUTOMATIC PROGRAMMING OF BEHAVIOR-BASED ROBOTS USING REINFORCEMENT LEARNING
    MAHADEVAN, S
    CONNELL, J
    ARTIFICIAL INTELLIGENCE, 1992, 55 (2-3) : 311 - 365
  • [30] Behavior-Based Detection for Malicious Script-Based Attack
    Yoon, Soojin
    Choo, Hyun-lock
    Bae, Hanchul
    Kim, Hwankuk
    ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2017, 421 : 97 - 103