浏览全部资源
扫码关注微信
1. 中国科学院软件研究所可信计算与信息保障实验室,北京 100190
2. 中国科学院大学计算机科学与技术学院,北京 100190
[ "黄桦烽(1988- ),男,福建永春人,中国科学院软件研究所工程师,主要研究方向为计算机系统安全、漏洞自动挖掘与利用" ]
[ "苏璞睿(1976- ),男,湖北宜昌人,博士,中国科学院软件研究所研究员,主要研究方向为系统安全、恶意代码分析、漏洞挖掘" ]
[ "杨轶(1982- ),男,河南鹤壁人,博士,中国科学院软件研究所副研究员,主要研究方向为计算机系统安全、漏洞挖掘与分析" ]
[ "贾相堃(1990- ),男,河北邯郸人,博士,中国科学院软件研究所副研究员,主要研究方向为系统安全、漏洞挖掘与分析" ]
网络出版日期:2022-01,
纸质出版日期:2022-01-25
移动端阅览
黄桦烽, 苏璞睿, 杨轶, 等. 可控内存写漏洞自动利用生成方法[J]. 通信学报, 2022,43(1):83-95.
Huafeng HUANG, Purui SU, Yi YANG, et al. Automatic exploitation generation method of write-what-where vulnerability[J]. Journal on communications, 2022, 43(1): 83-95.
黄桦烽, 苏璞睿, 杨轶, 等. 可控内存写漏洞自动利用生成方法[J]. 通信学报, 2022,43(1):83-95. DOI: 10.11959/j.issn.1000-436x.2022003.
Huafeng HUANG, Purui SU, Yi YANG, et al. Automatic exploitation generation method of write-what-where vulnerability[J]. Journal on communications, 2022, 43(1): 83-95. DOI: 10.11959/j.issn.1000-436x.2022003.
针对现有漏洞自动利用生成方法无法实现从“可控内存写”到“控制流劫持”的自动构造问题,提出一种可控内存写漏洞的自动利用生成方法。首先,基于内存地址控制力度的动态污点分析方法检测可控内存写漏洞;然后,基于漏洞利用模式进行利用要素搜索,通过约束求解自动构造可控内存写漏洞的利用。实验结果表明,所提方法可以有效检测可控内存写漏洞,搜索漏洞利用要素,自动生成从可控内存写到控制流劫持的利用。
To solve the problem that the current vulnerability automatic exploitation generation methods cannot automatically generate control-flow-hijacking exploitation from write-what-where
a method of automatic exploitation generation for write-what-where was proposed.First
the write-what-where vulnerability was detected based on the memory address control strength dynamic taint analysis method.Then
the vulnerability exploitation elements were searched based on the vulnerability exploitation modes
and the exploitation of write-what-where vulnerability was generated automatically by constraint solving.The experimental results show that the proposed method can effectively detect write-what-where vulnerability
search exploitation elements
and automatically generate the control-flow-hijacking exploitation from write-what-where.
孙鸿宇 , 何远 , 王基策 , 等 . 人工智能技术在安全漏洞领域的应用 [J ] . 通信学报 , 2018 , 39 ( 8 ): 1 - 17 .
UN H Y , HE Y , WANG J C , et al . Application of artificial intelligence technology in the field of security vulnerability [J ] . Journal on Communications , 2018 , 39 ( 8 ): 1 - 17 .
SONG J , ALVES-FOSS J , . The DARPA cyber grand challenge:a competitor’s perspective [J ] . IEEE Security & Privacy , 2015 , 13 ( 6 ): 72 - 76 .
BRUMLEY D , POOSANKAM P , SONG D , et al . Automatic patch-based exploit generation is possible:techniques and implications [C ] // Proceedings of 2008 IEEE Symposium on Security and Privacy . Piscataway:IEEE Press , 2008 : 143 - 157 .
AVGERINOS T , CHA S K , HAO B L T , et al . AEG:automatic exploit generation [C ] // Network and Distributed System Security Symposium . San Diego:DBLP , 2011 : 1 - 18 .
AVGERINOS T , CHA S K , REBERT A , et al . Automatic exploit generation [J ] . Communications of the ACM , 2014 , 57 ( 2 ): 74 - 84 .
CHA S K , AVGERINOS T , REBERT A , et al . Unleashing mayhem on binary code [C ] // 2012 IEEE Symposium on Security and Privacy . Piscataway:IEEE Press , 2012 : 380 - 394 .
WANG M H , SU P R , LI Q , et al . Automatic polymorphic exploit generation for software vulnerabilities [C ] // Security and Privacy in Communication Networks . Cham:Springer , 2013 : 216 - 233 .
HUANG S K , HUANG M H , HUANG P Y , et al . CRAX:software crash analysis for automatic exploit generation by modeling attacks as symbolic continuations [C ] // Proceedings of 2012 IEEE Sixth International Conference on Software Security and Reliability . Piscataway:IEEE Press , 2012 : 78 - 87 .
HE L , CAI Y , HU H , et al . Automatically assessing crashes from heap overflows [C ] // Proceedings of 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE) . Piscataway:IEEE Press , 2017 : 274 - 279 .
WANG Y , ZHANG C , XIANG X B , et al . Revery:from proof-of-concept to exploitable [C ] // Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security . New York:ACM Press , 2018 : 1914 - 1927 .
WU W , CHEN Y , XU J , et al . FUZE:towards facilitating exploit generation for kernel use-after-free vulnerabilities [C ] // Proceedings of the 27th USENIX Security Symposium . Berkeley:USENIX Association , 2018 : 781 - 797 .
方皓 , 吴礼发 , 吴志勇 . 基于符号执行的 Return-to-dl-resolve 利用代码自动生成方法 [J ] . 计算机科学 , 2019 , 46 ( 2 ): 127 - 132 .
FANG H , WU L F , WU Z Y . Automatic return-to-dl-resolve exploit generation method based on symbolic execution [J ] . Computer Science , 2019 , 46 ( 2 ): 127 - 132 .
HU H , CHUA Z L , ADRIAN S , et al . Automatic generation of data-oriented exploits [C ] // Proceedings of the 24th USENIX Security Symposium . Berkeley:USENIX Association , 2015 : 177 - 192 .
HU H , SHINDE S , ADRIAN S , et al . Data-oriented programming:on the expressiveness of non-control data attacks [C ] // Proceedings of 2016 IEEE Symposium on Security and Privacy . Piscataway:IEEE Press , 2016 : 969 - 986 .
ISPOGLOU K K , ALBASSAM B , JAEGER T , et al . Block oriented programming:automating data-only attacks [C ] // Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security . New York:ACM Press , 2018 : 1868 - 1882 .
SCHWARTZ E J , AVGERINOS T , BRUMLEY D , et al . Q:exploit hardening made easy [C ] // Proceedings of the 20th USENIX Security Symposium . Berkeley:USENIX Association , 2011 :25.
黄桦烽 , 王嘉捷 , 杨轶 , 等 . 有限资源条件下的软件漏洞自动挖掘与利用 [J ] . 计算机研究与发展 , 2019 , 56 ( 11 ): 2299 - 2314 .
HUANG H F , WANG J J , YANG Y , et al . Automatic software vulnerability discovery and exploit under the limited resource conditions [J ] . Journal of Computer Research and Development , 2019 , 56 ( 11 ): 2299 - 2314 .
0
浏览量
592
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构