Localizing Vulnerabilities Statistically From One Exploit

被引:12
作者
Shen, Shiqi [1 ]
Kolluri, Aashish [1 ]
Dong, Zhen [1 ]
Saxena, Prateek [1 ]
Roychoudhury, Abhik [1 ]
机构
[1] Natl Univ Singapore, Singapore, Singapore
来源
ASIA CCS'21: PROCEEDINGS OF THE 2021 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2021年
基金
新加坡国家研究基金会;
关键词
Vulnerability Localization; Directed Fuzzing;
D O I
10.1145/3433210.3437528
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Automatic vulnerability diagnosis can help security analysts identify and, therefore, quickly patch disclosed vulnerabilities. The vulnerability localization problem is to automatically find a program point at which the "root cause" of the bug can be fixed. This paper employs a statistical localization approach to analyze a given exploit. Our main technical contribution is a novel procedure to systematically construct a test-suite which enables high-fidelity localization. We build our techniques in a tool called VulnLoc which automatically pinpoints vulnerability locations, given just one exploit, with high accuracy. VulnLoc does not make any assumptions about the availability of source code, test suites, or specialized knowledge of the type of vulnerability. It identifies actionable locations in its Top-5 outputs, where a correct patch can be applied, for about 88% of 43 CVEs arising in large real-world applications we study. These include 6 different classes of security flaws. Our results highlight the under-explored power of statistical analyses, when combined with suitable test-generation techniques.
引用
收藏
页码:537 / 549
页数:13
相关论文
共 42 条
[1]   On the accuracy of spectrum-based fault localization [J].
Abreu, Rui ;
Zoeteweij, Peter ;
van Gemund, Arjan J. C. .
TAIC PART 2007 - TESTING: ACADEMIC AND INDUSTRIAL CONFERENCE - PRACTICE AND RESEARCH TECHNIQUES, PROCEEDINGS: CO-LOCATED WITH MUTATION 2007, 2007, :89-+
[2]  
AGRAWAL H, 1990, SIGPLAN NOTICES, V25, P246, DOI 10.1145/93548.93576
[3]  
[Anonymous], 2019, objdump
[4]  
[Anonymous], 2019, DYNAMORIO DYNAMIC IN
[5]  
Assiri Fatmah, 2016, SOFTWARE QUAL J, V2016
[6]  
Blazytko Tim, 2020, USENIX
[7]   Directed Greybox Fuzzing [J].
Bohme, Marcel ;
Van-Thuan Pham ;
Manh-Dung Nguyen ;
Roychoudhury, Abhik .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :2329-2344
[8]  
Chandra S, 2011, 2011 33RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), P121, DOI 10.1145/1985793.1985811
[9]   One Engine To Serve 'em All: Inferring Taint Rules Without Architectural Semantics [J].
Chua, Zheng Leong ;
Wang, Yanhao ;
Baluta, Teodora ;
Saxena, Prateek ;
Liang, Zhenkai ;
Su, Purui .
26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019), 2019,
[10]  
Cui WD, 2018, PROCEEDINGS OF THE 13TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P17