Vulnerability Recognition by Execution Trace Differentiation
dc.contributor.author | Viertel, Fabien Patrick | |
dc.contributor.author | Karras, Oliver | |
dc.contributor.author | Schneider, Kurt | |
dc.date.accessioned | 2023-03-02T10:54:08Z | |
dc.date.available | 2023-03-02T10:54:08Z | |
dc.date.issued | 2017 | |
dc.description.abstract | In context of security, one of the major problems for software development is the difficult and timeconsuming task to find and fix known vulnerabilities through the vulnerability documentation resulting out of a penetration test. This documentation contains for example the location and description of found vulnerabilities. To be able to find and fix a vulnerability, developers have to check this documentation. We developed a tool-based semi-automated analysis approach to locate and fix security issues by recorded execution traces. For identifying the affected source code snippets in the project code, we determine the difference between a regular and a malicious execution trace. This difference is an indicator for a potential vulnerability. As case study for this analysis we use vulnerabilities, which enable remote code execution. We implemented this approach in a software prototype named FOCUS+. This tool visualizes the traces and differences by several views such as a method call graph view. All views facilitate direct access to affected code snippets and point to the possible vulnerabilities. Thus, identified security gaps can immediately be fixed in FOCUS+. | en |
dc.identifier.pissn | 0720-8928 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/40608 | |
dc.language.iso | en | |
dc.publisher | Geselllschaft für Informatik e.V. | |
dc.relation.ispartof | Softwaretechnik-Trends Band 37, Heft 3 | |
dc.subject | Code Exploit | |
dc.subject | Execution Trace | |
dc.subject | Vulnerability Analysis | |
dc.title | Vulnerability Recognition by Execution Trace Differentiation | en |
dc.type | Text/Journal Article | |
gi.citation.endPage | 7 | |
gi.citation.publisherPlace | Bonn | |
gi.citation.startPage | 5 | |
gi.conference.sessiontitle | Sonderteil: Proceedings of the 8th Symposium on Software Performance (SSP), Karlsruhe, 09. - 10. November 2017 |
Dateien
Originalbündel
1 - 1 von 1
Vorschaubild nicht verfügbar
- Name:
- 01_Vulnerability_Recognition_by_Execution_Trace_Differentiation.pdf
- Größe:
- 490.09 KB
- Format:
- Adobe Portable Document Format