标题: 自动化胁迫生成设计与实作
Design and Implement of Automatic Exploit Generation Process
作者: 林政德
黄世昆
Lin, Cheng-Te
Huang, Shin-Kun
资讯科学与工程研究所
关键字: 自动化胁迫产生;符号执行;Automatic Exploit Generation;Symbolic Execution
公开日期: 2017
摘要: 随着资讯技术的发展和网际网路的普及运用,大量应用程式与服务都经由网路连接与沟通。但这些应用程式与服务可能有软体漏洞,有心人士可经网路利用,形成威胁。在资讯安全领域中,可分为防御和攻击二种方向。防御方面的研究主要是透过软体测试和漏洞修补来避免或减少危害,而攻击方面的研究则是注重如何有效利用软体漏洞。自动胁迫生成是属于攻击方面的研究。
我们过去有发展称为 CRAX的自动胁迫生成平台 (Automatic exploit generation)。CRAX采用全系统符号执行的方式,可利用底层核心与大型软体的漏洞,但同时因为全系统的模拟操作,必须记录完整核心状态,操作过程较为繁琐,可用性较低。为了增进CRAX的可用性,我们实作Python API来达成CRAX操作流程的自动化。透过这套自动化胁迫生成API,使用者可以自动生成大量胁迫测试资料。
With the development of information technology and the popularity of the Internet, client applications and services communicate with each through network. However, there may be some software vulnerabilities in these applications, so that those vulnerabilities can be exploited, resulting in security threats. In the security research field, there are defense and attack directions . For defense research, we mainly focus on avoiding and reducing the security risks by software testing and vulnerability repair. For attack research, we focus on how to effectively exploit the software vulnerabilities. Automatic exploit generation is one of main area of attack research.
We formerly have developed an automatic exploit generation platform called CRAX. CRAX inherits some good features from its underlying platform, but it also inherits some bad features, especially the cumbersome operation process. In order to improve the usability of CRAX, this study implements a set of Python API to automate the operation process of CRAX. With this automatic exploit generation API, users can easily exploit a large number of programs at once.
URI: http://etd.lib.nctu.edu.tw/cdrfb3/record/nctu/#GT070356017
http://hdl.handle.net/11536/142292
显示于类别:Thesis