Attack Surface Prioritization with Crash Dump Stack Traces

ثبت نشده
چکیده

Resource limitations often preclude security professionals from reviewing, testing, and fortifying an entire code base. Identifying metrics that enable prioritization of security efforts would help practitioners discover security issues more efficiently. Risk-Based Attack Surface Approximation (RASA) makes use of crash dump stack trace from a targeted software system to provide an estimated attack surface. In this paper, we extend the RASA approach, to develop a series of metrics that could help identify how the attack surface changes and if areas of the attack surface have more dangerous vulnerabilities. The goal of this research is to aid software engineers in approximating the attack surface of software systems by developing metrics based on crash dump stack traces. In this paper, we present the RASA approach and three metrics based on crash dump stack traces: change, complexity, and boundary metrics. We parsed 24.5 million stack traces from Windows 8, 8.1, and 10 for inclusion in our study. With change metrics, we help security professionals identify code that has fallen off or been added to the attack surface for the target system. For example, 58.7% of code that was seen on crash dump stack traces changed from Windows 8.1 to Windows 10. With complexity metrics, we measure fan-in and fan-out measures from crash dump stack traces to determine whether certain vulnerabilities are more impactful than others. With boundary metrics, we determine where the boundary of the software system is, or where crash dump stack traces indicate entry and exit points to the system might be. We determined that only 4% of vulnerabilities fixed for Windows 8.1 appeared on the boundary of the system.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Risk-Based Attack Surface Approximation

In our increasingly interconnected world, software security is an increasingly important issue for development teams. However, there is too much security work to do for these teams as security needs have out-scaled security resources. To help prioritize security efforts, professionals use the attack surface of a system, or the sum of all paths for untrusted data into and out of a system, to ide...

متن کامل

Cores, Debugging, and Coverage

Debugging is difficult and costly, especially for production failures. To aid developers, we enhance core memory dumps produced by crashing applications with lightweight, tunable tracing. We propose two complementary forms of tracing, path traces and global coverage, and demonstrate that they can provide substantial postmortem analysis benefit at low cost. Recent work focuses on the interplay o...

متن کامل

Locating Crashing Faults based on Crash Stack Traces

Software crashes due to its increasing complexity. Once a crash happens, a crash report could be sent to software developers for investigation upon user permission. Because of the large number of crash reports and limited information, debugging for crashes is often a tedious and labor-intensive task. In this paper, we propose a statistical fault localization framework to help developers locate ...

متن کامل

Poster: Post-Intrusion Memory Forensics Analysis

A yet-to-be-solved but very vital problem in forensics analysis is accurate memory dump data type reverse engineering where the target process is not a priori specified and could be any of the running processes within the system. We present a lightweight system-wide solution that extracts data type information from the memory dump without its past execution traces. Our proposed solution constru...

متن کامل

Improving the quality of APIs through the analysis of software crash reports

Modern programs depend on apis to implement a significant part of their functionality. Apart from the way developers use apis to build their software, the stability of these programs relies on the apis design and implementation. In this work, we evaluate the reliability of apis, by examining software telemetry data, in the form of stack traces, coming from Android application crashes. We got 4....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017