Filters








2,630 Hits in 3.4 sec

Fuzz Testing in Stack-Based Buffer Overflow [chapter]

Manisha Bhardwaj, Seema Bawa
2018 Advances in Intelligent Systems and Computing  
The Stack based-American Fuzzy Lop( SAFAL) model has been proposed. This model works for software to exploit vulnerabilities.  ...  One such attack is buffer overflow attack which are threat to the software system and application for decades.  ...  For exploit generation, stack buffer overflow exploitation it is necessary to prioritize bugs. Bugs and vulnerabilities can be detected at binary code and source code analysis [9] [14] .  ... 
doi:10.1007/978-981-13-0341-8_3 fatcat:i62j7xx5iffidjpir2i62chg4u

Automatic exploit generation

Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, David Brumley
2014 Communications of the ACM  
Our contributions are: 1) we show how exploit generation for control flow hijack attacks can be modeled as a formal verification problem, 2) we propose preconditioned symbolic execution, a novel technique  ...  for targeting symbolic execution, 3) we present a general approach for generating working exploits once a bug is found, and 4) we build the first end-to-end system that automatically finds vulnerabilities  ...  We would also like to thank our anonymous reviewers for their useful comments and suggestions. This material is based upon work supported by the National Science Foundation under Grant No. 0953751.  ... 
doi:10.1145/2560217.2560219 fatcat:zag6jznqmfcxjnoeppcgwde2oe

Defending against Buffer-Overflow Vulnerabilities

Bindu Padmanabhuni, Hee Beng Kuan Tan
2011 Computer  
Acknowledgment This work is funded by the Centre for Strategic Infocomm Technologies, MINDEF Singapore.  ...  A review of buffer-overflow exploits and an analysis of their solutions reveals deficiencies in present defenses, providing a basis for developing modifications to protect against such exploits.  ...  When a buffer in the stack overflows, it will corrupt the canary. A program can use the canary as a check against buffer overflow. Another method for hijacking program control uses long jump buffers.  ... 
doi:10.1109/mc.2011.229 fatcat:6ntjeve76nfm5dpvrdrastrcae

ARCUS: Symbolic Root Cause Analysis of Exploits in Production Systems

Carter Yagemann, Matthew Pruett, Simon P. Chung, Kennon Bittick, Brendan Saltaformaggio, Wenke Lee
2021 USENIX Security Symposium  
., buffer overflow), creating a gap whereby bug reports received by developers contain (at best) a snapshot of the process long after it executed the buggy instructions.  ...  Using hardware-supported processor tracing, ARCUS decouples the cost of analysis from host performance.  ...  Acknowledgments We thank the anonymous reviewers for their helpful and informative feedback.  ... 
dblp:conf/uss/YagemannPCBSL21 fatcat:cfwe7o4gdfetnmgxvakd4pw754

Modular Synthesis of Heap Exploits

Dusan Repel, Johannes Kinder, Lorenzo Cavallaro
2017 Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security - PLAS '17  
Recent efforts to automatically synthesize exploits for stack-based buffer overflows promise to help assess a vulnerability's severity more quickly and alleviate the burden of manual reasoning.  ...  However, generation of heap exploits has been out of scope for such methods thus far.  ...  Dusan Repel was supported by the EPSRC and the UK government as part of the Centre for Doctoral Training in Cyber Security (EP/K035584/1).  ... 
doi:10.1145/3139337.3139346 dblp:conf/ccs/RepelKC17 fatcat:ch3dbqqotvbwjalfxw4jg5lmwy

On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits

Jedidiah R. Crandall, Zhendong Su, S. Felix Wu
2005 Proceedings of the 12th ACM conference on Computer and communications security - CCS '05  
It is important for an analysis tool to be able to generalize from a new exploit observed and derive protection for the vulnerability.  ...  We formalize this idea and subject it to quantitative analysis with a symbolic execution tool called DACODA.  ...  Even simple stack-based buffer overflows can have this property, like the RPC DCOM exploit or the Slammer exploit.  ... 
doi:10.1145/1102120.1102152 dblp:conf/ccs/CrandallSW05 fatcat:w2qddfyfe5a2zhnsvwzlmy2l34

A Binary Analysis Approach to Retrofit Security in Input Parsing Routines

Jayakrishna Menon, Christophe Hauser, Yan Shoshitaishvili, Stephen Schwab
2018 2018 IEEE Security and Privacy Workshops (SPW)  
This process, if done manually in an ad-hoc manner, is error prone and easily leads to unsafe and potentially exploitable behavior.  ...  Our system is able to effectively detect vulnerability patterns in binary software and to retrofit security mechanisms preventing exploitation.  ...  Our initial focus is on the detection of stack-based buffer overflows, where the destination buffer is allocated on the stack.  ... 
doi:10.1109/spw.2018.00049 dblp:conf/sp/MenonHSS18 fatcat:hszgfyzrrfdjbpe4kx7kln5o44

Testing static analysis tools using exploitable buffer overflows from open source code

Misha Zitser, Richard Lippmann, Tim Leek
2004 Proceedings of the 12th ACM SIGSOFT twelfth international symposium on Foundations of software engineering - SIGSOFT '04/FSE-12  
Each code example included a "BAD" case with and a "OK" case without buffer overflows.  ...  Five modern static analysis tools (ARCHER, BOON, Poly-Space C Verifier, Splint, and UNO) were evaluated using source code examples containing 14 exploitable buffer overflow vulnerabilities found in various  ...  ACKNOWLEDGEMENTS We would like to thank Robert Cunnigham, Roger Khazan, Kendra Kratkiewicz, and Jesse Rabek for discussions on static analysis.  ... 
doi:10.1145/1029894.1029911 dblp:conf/sigsoft/ZitserLL04 fatcat:l3vplvffhzhcffckjjbgj2gidi

Testing static analysis tools using exploitable buffer overflows from open source code

Misha Zitser, Richard Lippmann, Tim Leek
2004 Software engineering notes  
Each code example included a "BAD" case with and a "OK" case without buffer overflows.  ...  Five modern static analysis tools (ARCHER, BOON, Poly-Space C Verifier, Splint, and UNO) were evaluated using source code examples containing 14 exploitable buffer overflow vulnerabilities found in various  ...  ACKNOWLEDGEMENTS We would like to thank Robert Cunnigham, Roger Khazan, Kendra Kratkiewicz, and Jesse Rabek for discussions on static analysis.  ... 
doi:10.1145/1041685.1029911 fatcat:3mfrinqgnfd5dfvshsstlpepki

AEMB: An Automated Exploit Mitigation Bypassing Solution

Ruipeng Wang, Zulie Pan, Fan Shi, Min Zhang
2021 Applied Sciences  
Next, during the program's execution, AEMB uses symbol execution to collect symbol information and create exploit constraints.  ...  Many current AEG solutions do not fully account for exploit mitigations, and as a result, they are unable to accurately assess the exploitability of vulnerabilities in such settings.This paper proposes  ...  Acknowledgments: We would like to sincerely thank all the reviewers for your time and expertise on this paper. Your insightful comments help us improve this work.  ... 
doi:10.3390/app11209727 fatcat:kshwfqpf2zcd5nxdeiwsvk36pm

Security Vulnerabilities: From Analysis to Detection and Masking Techniques

S. Chen, J. Xu, Z. Kalbarczyk, K. Iyer
2006 Proceedings of the IEEE  
This paper presents a study that uses extensive analysis of real security vulnerabilities to drive the development of: 1) runtime techniques for detection/masking of security attacks and 2) formal source  ...  We also propose a static analysis approach to detect potential security vulnerabilities using the notion of pointer taintedness.  ...  Analysis of other types of vulnerabilities, including stack buffer overflow, heap corruption, and format-string vulnerabilities leads to the same observation. • Exploiting a vulnerability involves multiple  ... 
doi:10.1109/jproc.2005.862473 fatcat:kavo66oagvgzjpgw6yogcl3xfe

Binary rewriting and call interception for efficient runtime protection against buffer overflows

Kumar Avijit, Prateek Gupta, Deepak Gupta
2006 Software, Practice & Experience  
In this paper, we present a novel approach for transparent and efficient runtime protection against buffer overflows.  ...  Buffer overflow vulnerabilities are one of the most commonly and widely exploited security vulnerabilities in programs.  ...  ACKNOWLEDGEMENTS Partial support for this work from the Prabhu Goel Research Center for Computer and Internet Security at IIT Kanpur is gratefully acknowledged.  ... 
doi:10.1002/spe.720 fatcat:7wk2hqcqv5dkbpkqtbdjcnl53q

ExpGen: A 2-Step Vulnerability Exploitability Evaluation Solution for Binary Programs under ASLR Environment

Hui Huang, Yuliang Lu, Zulie Pan, Kailong Zhu, Lu Yu, Liqun Zhang
2022 Applied Sciences  
We propose ExpGen, a 2-step vulnerability-exploitability evaluation solution for binary programs running in an ASLR environment, with three novel techniques introduced, separately partial-exploit sensitive-POC  ...  Therefore, they usually fail in evaluating exploitability for vulnerable programs running in an ASLR environment.  ...  Acknowledgments: We would like to sincerely thank all the reviewers for your time and expertise on this paper. Your insightful comments help us improve this work.  ... 
doi:10.3390/app12136593 fatcat:y3ua3sh4lvazhcm646265ze2di

Buffer Overflow Detection via Static Analysis: Expectations vs. Reality
Статический анализ для поиска переполнения буфера: актуальные направления развитияалгоритмов

I.A. Dudina
2018 Proceedings of the Institute for System Programming of RAS  
Now it can perform interprocedural context-and path-sensitive analysis to detect buffer overflow mainly for static and stack objects with approximately 65% true positive ratio.  ...  An analysis can really benefit from tracking affine relations between variables and modeling C-style strings as a very important case of buffers.  ...  In our sample about a half of overflowed buffers (48%) reside on a stack, other half (48%) is allocated on a heap, and just a few are global variables. 40% of all defects have overflowed buffer accessed  ... 
doi:10.15514/ispras-2018-30(3)-2 fatcat:nk3gcaxlfvcwfebnq6woqjsrpq

Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities [chapter]

Jedidiah R. Crandall, S. Felix Wu, Frederic T. Chong
2005 Lecture Notes in Computer Science  
We discuss complexities of the exploits Minos has caught that are not accounted for in the simple model of "buffer overflow exploits" prevalent in the literature.  ...  a detailed analysis of the exploit.  ...  In this model there is a buffer on the stack which is overflowed with the attacker's input to overwrite the return pointer if the attacker uses some exploit vector.  ... 
doi:10.1007/11506881_3 fatcat:2tjl53e3frabteknrgkmei2tae
« Previous Showing results 1 — 15 out of 2,630 results