Title
Automatic Polymorphic Exploit Generation for Software Vulnerabilities.
Abstract
Generating exploits from the perspective of attackers is an effective approach towards severity analysis of known vulnerabilities. However, it remains an open problem to generate even one exploit using a program binary and a known abnormal input that crashes the program, not to mention multiple exploits. To address this issue, in this paper, we propose PolyAEG, a system that automatically generates multiple exploits for a vulnerable program using one corresponding abnormal input. To generate polymorphic exploits, we fully leverage different trampoline instructions to hijack control flow and redirect it to malicious code in the execution context. We demonstrate that, given a vulnerable program and one of its abnormal inputs, our system can generate polymorphic exploits for the program. We have successfully generated control flow hijacking exploits for 8 programs in our experiment. Particularly, we have generated 4,724 exploits using only one abnormal input for Irfan View, a widely used picture viewer.
Year
DOI
Venue
2013
10.1007/978-3-319-04283-1_14
Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering
Keywords
Field
DocType
software vulnerability,dynamic taint analysis,exploit generation
Vulnerability (computing),Open problem,Computer science,Computer security,Control flow,Exploit,Software,Trampoline,Vulnerability,Binary number
Conference
Volume
ISSN
Citations 
127
1867-8211
5
PageRank 
References 
Authors
0.50
14
6
Name
Order
Citations
PageRank
Minghua Wang16415.40
Purui Su29413.71
Li Qi334567.01
Lingyun Ying4243.41
Yi Yang571.25
Deng-Guo Feng61991190.95