DocumentCode :
1705001
Title :
Proactive Vulnerability Finding via Information Flow Tracking
Author :
Liu, Zhi ; Zhang, Xiaosong ; Li, Xiongda
Author_Institution :
Comput. Sci. & Eng., UESTC, Chengdu, China
fYear :
2010
Firstpage :
481
Lastpage :
485
Abstract :
Software vulnerability is the major root of security issues which results in serious attacks such as DDOS and worms. How to find vulnerability especially on binaries has been an alluring but challenging topic. Traditional black-box fuzzing heavily relies on input format so that it cannot work on unknown formats, more severely, it cannot generate effective test cases because it randomly change input values. Therefore, fuzzing is rarely effective in real-world circumstances. Information flow tracking, namely taint analysis, has been used in recent years in attack detection and malware analysis but no prior work has used this technique to actively find software vulnerability on binaries. In this paper, we propose a novel approach to find software vulnerability via dynamic tainting consisting of three steps. First execute target program with a seed input being independent of input format. Then identify relevant bytes by back tracking from vulnerability points, defined as dangerous library or system calls, to the original input. Finally generate new test cases by mutating relevant bytes while irrelevant parts remain unchanged. It guarantees that new inputs are able to divert execution flow to vulnerability points. We implemented the system in Windows and evaluated two real-world vulnerabilities. Compared with black-box fuzzing, experiment results show our approach can generate effective test inputs to expose vulnerabilities in short time, which also incurs low overhead.
Keywords :
invasive software; software fault tolerance; DDOS; Windows; black box fuzzing; information flow tracking; malware analysis; proactive vulnerability finding; software vulnerability; worms; Engines; Instruments; Portable document format; Registers; Security; Software; Testing; fuzzing; taint analysis; vulnerabilit;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Multimedia Information Networking and Security (MINES), 2010 International Conference on
Conference_Location :
Nanjing, Jiangsu
Print_ISBN :
978-1-4244-8626-7
Electronic_ISBN :
978-0-7695-4258-4
Type :
conf
DOI :
10.1109/MINES.2010.108
Filename :
5671078
Link To Document :
بازگشت