BofAEG: Automated Stack Buffer Overflow Vulnerability Detection and Exploit Generation Based on Symbolic Execution and Dynamic Analysis

Author:

Xu Shenglin1ORCID,Wang Yongjun1

Affiliation:

1. School of Computer, National University of Defense Technology, Changsha, China

Abstract

Stack buffer overflow vulnerability is a common software vulnerability that can overwrite function return addresses and hijack program control flow, causing serious system problems. Existing automated exploit generation (AEG) solutions cannot bypass position-independent executable (PIE) exploit mitigation and cannot cope with the situation where the standard output function is not introduced into the program. In this paper, we propose a solution to alleviate the above difficulties: BofAEG, which is based on symbolic execution and dynamic analysis to automatically detect stack buffer overflow vulnerability and generate exploit. We used to capture the flag (CTF) and common vulnerabilities and exposures (CVE) programs for experiments. Results show that BofAEG can not only detect and generate exploits effectively but also implement more exploit techniques and is faster than existing AEG solutions.

Funder

National Basic Research Program of China

Publisher

Hindawi Limited

Subject

Computer Networks and Communications,Information Systems

Reference43 articles.

1. Smashing the stack for fun and profit;A. One;Phrack magazine,1996

2. Related to Stack Buffer Overflow Vulnerabilities;CVEs,2022

3. Stackguard: automatic adaptive detection and prevention of buffer-overflow attacks;C. Cowan,1998

4. Return-Oriented Programming

Cited by 5 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. AutoPwn: Artifact-Assisted Heap Exploit Generation for CTF PWN Competitions;IEEE Transactions on Information Forensics and Security;2024

2. AAHEG: Automatic Advanced Heap Exploit Generation Based on Abstract Syntax Tree;Symmetry;2023-12-14

3. Fine-Grained Modeling of ROP Vulnerability Exploitation Process under Stack Overflow Based on Petri Nets;Electronics;2023-11-22

4. CanaryExp: A Canary-Sensitive Automatic Exploitability Evaluation Solution for Vulnerabilities in Binary Programs;Applied Sciences;2023-11-21

5. Protect the System Call, Protect (Most of) the World with BASTION;Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 3;2023-03-25

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3