Detecting AAA Vulnerabilities by Mining Execution Profiles
نویسندگان
چکیده
Security vulnerabilities are often due to latent software defects, which can be exploited by a malicious attacker. For example, a buffer overflow vulnerability can derive from a program’s failure to check the size of its input. Security vulnerabilities are often present in complex software after deployment, and these defects must be identified early so as to minimize the damages that attackers can inflict. Meanwhile, Authentication, Authorization, and Accounting (AAA) services, such as Kerberos, Pubcookie, and Shibboleth, address the growing security demands for network access control. Distributed applications rely on AAA platforms to protect users and other stakeholders. However, AAA middleware potentially contains latent defects, which in turn can cause security holes. If such a vulnerability is exploited, the attacker can compromise any application that relies on the AAA services. Therefore, it is crucial to identify and correct latent AAA defects. We are pursuing an integrated methodology for the identification of defects in AAA platforms. Our approach is based on execution capture, replay, profiling, and on mining the resulting execution profiles. We have used (or plan to use) a suite of complementary execution profiling techniques to reveal program or user behavior associated with exploits. Such techniques include code coverage profiling, object state profiling, information flow analysis, event sequence profiling, and temporal profiling. Our array of profiling techniques is more comprehensive and has a finer granularity than those used in other security platforms, such as Intrusion Detection Systems (IDS) and firewalls. In particular, we monitor the source code, the back-end database, and various event sequences. We have used statistical methods borrowed from multivariate visualization, such as correspondence analysis and multidimensional scaling.
منابع مشابه
An advanced approach for modeling and detecting software vulnerabilities
Context. Passive testing is a technique in which traces collected from the execution of a system under test are examined for evidence of flaws in the system. Objective. In this paper we present a method for detecting the presence of security vulnerabilities by detecting evidence of their causes in execution traces. This is a new approach to security vulnerability detection. Method. Our method u...
متن کاملIntegrating Static Analysis Tools for Improving Operating System Security
Static analysis approach is widely used for detecting vulnerabilities within the code before the execution. C/C++ programming languages consist of highest number of vulnerabilities of which buffer overflow is the highest rated. Of all static analysis tools available none has enabled to detect all the vulnerabilities. Hence, we have proposed an integrated approach using two open-source static an...
متن کاملMining the Categorized Software Repositories to Improve the Analysis of Security Vulnerabilities
Security has become the Achilles’ heel of most modern software systems. Techniques ranging from the manual inspection to automated static and dynamic analyses are commonly employed to identify security vulnerabilities prior to the release of the software. However, these techniques are time consuming and cannot keep up with the complexity of ever-growing software repositories (e.g., Google Play ...
متن کاملConFu: Configuration Fuzzing Framework for Software Vulnerability Detection Thesis proposal
Many software security vulnerabilities only reveal themselves under certain conditions, i.e., particular configurations of the software and certain inputs together with its particular runtime environment. One approach to detecting these vulnerabilities is fuzz testing, which feeds a range of randomly modified inputs to a software application while monitoring it for failures. However, typical fu...
متن کاملText-Mining and Pattern-Matching based Prediction Models for Detecting Vulnerable Files in Web Applications
The proliferation of technology has empowered the web applications. At the same time, the presences of Cross-Site Scripting (XSS) vulnerabilities in web applications have become a major concern for all. Despite the many current detection and prevention approaches, attackers are exploiting XSS vulnerabilities continuously and causing significant harm to the web users. In this paper, we formulate...
متن کامل