An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression

المؤلفون المشاركون

Feng, Chao
Tang, Chaojing
Jiang, Zhiyuan

المصدر

Security and Communication Networks

العدد

المجلد 2018، العدد 2018 (31 ديسمبر/كانون الأول 2018)، ص ص. 1-21، 21ص.

الناشر

Hindawi Publishing Corporation

تاريخ النشر

2018-03-28

دولة النشر

مصر

عدد الصفحات

21

التخصصات الرئيسية

تكنولوجيا المعلومات وعلم الحاسوب

الملخص EN

To quickly verify and fix vulnerabilities, it is necessary to judge the exploitability of the massive crash generated by the automated vulnerability mining tool.

While the current manual analysis of the crash process is inefficient and time-consuming, the existing automated tools can only handle execute exceptions and some write exceptions but cannot handle common read exceptions.

To address this problem, we propose a method of determining the exploitability based on the exception type suppression.

This method enables the program to continue to execute until an exploitable exception is triggered.

The method performs a symbolic replay of the crash sample, constructing and reusing data gadget, to bypass the complex exception, thereby improving the efficiency and accuracy of vulnerability exploitability analysis.

The testing of typical CGC/RHG binary software shows that this method can automatically convert a crash that cannot be judged by existing analysis tools into a different crash type and judge the exploitability successfully.

نمط استشهاد جمعية علماء النفس الأمريكية (APA)

Jiang, Zhiyuan& Feng, Chao& Tang, Chaojing. 2018. An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression. Security and Communication Networks،Vol. 2018, no. 2018, pp.1-21.
https://search.emarefa.net/detail/BIM-1214153

نمط استشهاد الجمعية الأمريكية للغات الحديثة (MLA)

Jiang, Zhiyuan…[et al.]. An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression. Security and Communication Networks No. 2018 (2018), pp.1-21.
https://search.emarefa.net/detail/BIM-1214153

نمط استشهاد الجمعية الطبية الأمريكية (AMA)

Jiang, Zhiyuan& Feng, Chao& Tang, Chaojing. An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression. Security and Communication Networks. 2018. Vol. 2018, no. 2018, pp.1-21.
https://search.emarefa.net/detail/BIM-1214153

نوع البيانات

مقالات

لغة النص

الإنجليزية

الملاحظات

Includes bibliographical references

رقم السجل

BIM-1214153