LAVA: Large-scale Automated Vulnerability Addition

被引:201
|
作者
Dolan-Gavitt, Brendan [1 ]
Hulin, Patrick [2 ]
Kirda, Engin [3 ]
Leek, Tim [2 ]
Mambretti, Andrea [3 ]
Robertson, Wil [3 ]
Ulrich, Frederick [2 ]
Whelan, Ryan [2 ]
机构
[1] NYU, New York, NY 10003 USA
[2] MIT, Lincoln Lab, Cambridge, MA 02139 USA
[3] Northeastern Univ, Boston, MA USA
来源
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) | 2016年
基金
美国国家科学基金会;
关键词
D O I
10.1109/SP.2016.15
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Work on automating vulnerability discovery has long been hampered by a shortage of ground-truth corpora with which to evaluate tools and techniques. This lack of ground truth prevents authors and users of tools alike from being able to measure such fundamental quantities as miss and false alarm rates. In this paper, we present LAVA, a novel dynamic taint analysis-based technique for producing ground-truth corpora by quickly and automatically injecting large numbers of realistic bugs into program source code. Every LAVA bug is accompanied by an input that triggers it whereas normal inputs are extremely unlikely to do so. These vulnerabilities are synthetic but, we argue, still realistic, in the sense that they are embedded deep within programs and are triggered by real inputs. Using LAVA, we have injected thousands of bugs into eight real-world programs, including bash, tshark, and the GNU coreutils. In a preliminary evaluation, we found that a prominent fuzzer and a symbolic execution-based bug finder were able to locate some but not all LAVA-injected bugs, and that interesting patterns and pathologies were already apparent in their performance. Our work forms the basis of an approach for generating large ground-truth vulnerability corpora on demand, enabling rigorous tool evaluation and providing a high-quality target for tool developers.
引用
收藏
页码:110 / 121
页数:12
相关论文
共 50 条
  • [31] Automated Debriefing: Interface for Large-Scale Research Ethics
    Zong, Jonathan
    Matias, J. Nathan
    COMPANION OF THE 2018 ACM CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK AND SOCIAL COMPUTING (CSCW'18), 2018, : 21 - 24
  • [32] Toward Large-Scale Vulnerability Discovery using Machine Learning
    Grieco, Gustavo
    Grinblat, Guillermo Luis
    Uzal, Lucas
    Rawat, Sanjay
    Feist, Josselin
    Mounier, Laurent
    CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, : 85 - 96
  • [33] Vulnerability of the large-scale future smart electric power grid
    Nasiruzzaman, A. B. M.
    Pota, H. R.
    Akter, Most. Nahida
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2014, 413 : 11 - 24
  • [34] LARGE-SCALE AND AUTOMATED DNA-SEQUENCE DETERMINATION
    HUNKAPILLER, T
    KAISER, RJ
    KOOP, BF
    HOOD, L
    SCIENCE, 1991, 254 (5028) : 59 - 67
  • [35] An Automated Charger for Large-Scale Adoption of Electric Vehicles
    Faddel, Samy
    Youssef, Tarek
    Elsayed, Ahmed T.
    Mohammed, Osama A.
    IEEE TRANSACTIONS ON TRANSPORTATION ELECTRIFICATION, 2018, 4 (04): : 971 - 984
  • [36] The problem of evaluating automated large-scale evidence aggregators
    Nicolas Wüthrich
    Katie Steele
    Synthese, 2019, 196 : 3083 - 3102
  • [37] Directory support for large-scale, automated service composition
    Binder, W
    Constantinescu, I
    Faltings, B
    SOFTWARE COMPOSITION, 2005, 3628 : 57 - 66
  • [38] Vulnerability Analysis of Large-Scale Dynamical Networks to Coordinated Attacks
    Pushpak, Sai
    Diwadkar, Amit
    Fardad, Makan
    Vaidya, Umesh
    2014 4TH AUSTRALIAN CONTROL CONFERENCE (AUCC), 2014, : 95 - 100
  • [39] Efficient Vulnerability Assessment of Large-Scale Dynamic Transportation Networks
    Shekar, Venkateswaran
    Fiondella, Lance
    IEEE TRANSACTIONS ON RELIABILITY, 2024, : 1 - 13
  • [40] On the Problem of the Automated Design of Large-Scale Robot Skin
    Anghinolfi, Davide
    Cannata, Giorgio
    Mastrogiovanni, Fulvio
    Nattero, Cristiano
    Paolucci, Massimo
    IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2013, 10 (04) : 1087 - 1100