透過您的圖書館登入
IP:3.142.35.155
  • 期刊

自動脅迫產生器發展現況與威脅分析

摘要


脅迫產生(Exploit Generation)過去都被視為一種無法自動化的過程,需具備純熟安全技能的人力介入。但近年來符號執行技術(Symbolic Execution)的快速發展,完全自動化的脅迫產生(Automatic Exploit Generation, 以下簡稱 AEG)已經可行。首先,我們將介紹目前僅有的三個組織(英國劍橋大學、美國卡內基美隆大學、與國立交通大學)的研發成果,並進行效能與定性的現況分析。最後,我們將針對AEG技術的未來發展,提出軟體系統與程式安全的思維改變。因為AEG可自動將程式的可靠性錯誤(Software Reliability),轉化為安全性弱點(Software Vulnerability),軟體安全與軟體品質的界線將趨於模糊,進而提出軟體錯誤即軟體安全缺陷(Bug as Vulnerability, BaV),軟體錯誤即隱含軟體後門(Bug as Backdoor, BaB)的思考方向。

並列摘要


參考文獻


“!exploitable crash analyzer,” http://msecdbg.codeplex.com/.
Avgerinos, T.,Cha, S. K.,Hao, B. L. T.,Brumley, D.(2011).AEG: Automatic Exploit Generation.Proceedings of the Network and Distributed System Security Symposium (NDSS'11).(Proceedings of the Network and Distributed System Security Symposium (NDSS'11)).:
Bellard, F.(2005).QEMU, a fast and portable dynamic translator.Proceedings of the FREENIX Track: 2005 USENIX Annual Technical Conference.(Proceedings of the FREENIX Track: 2005 USENIX Annual Technical Conference).:
Brumley, D.,Poosankam, P.,Song, D. X.,Zheng, J.(2008).Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications.Proceedings of the 2008 IEEE Symposium on Security and Privacy (S&P 2008).(Proceedings of the 2008 IEEE Symposium on Security and Privacy (S&P 2008)).:
Cadar, C.,Dunbar, D.,Engler, D. R.(2008).KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs.Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation (OSDI'08).(Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation (OSDI'08)).:

被引用紀錄


陳泓文(2015)。結合滲透測試框架之攻擊脅迫強化系統〔碩士論文,國立交通大學〕。華藝線上圖書館。https://doi.org/10.6842/NCTU.2015.00212
Hsiang, C. (2014). 具目標認知符號執行模糊測試框架 [master's thesis, National Chiao Tung University]. Airiti Library. https://doi.org/10.6842/NCTU.2014.00143

延伸閱讀