Logo des Repositoriums
 

Vulnerability Recognition by Execution Trace Differentiation

dc.contributor.authorViertel, Fabien Patrick
dc.contributor.authorKarras, Oliver
dc.contributor.authorSchneider, Kurt
dc.date.accessioned2023-03-02T10:54:08Z
dc.date.available2023-03-02T10:54:08Z
dc.date.issued2017
dc.description.abstractIn context of security, one of the major problems for software development is the difficult and timeconsuming task to find and fix known vulnerabilities through the vulnerability documentation resulting out of a penetration test. This documentation contains for example the location and description of found vulnerabilities. To be able to find and fix a vulnerability, developers have to check this documentation. We developed a tool-based semi-automated analysis approach to locate and fix security issues by recorded execution traces. For identifying the affected source code snippets in the project code, we determine the difference between a regular and a malicious execution trace. This difference is an indicator for a potential vulnerability. As case study for this analysis we use vulnerabilities, which enable remote code execution. We implemented this approach in a software prototype named FOCUS+. This tool visualizes the traces and differences by several views such as a method call graph view. All views facilitate direct access to affected code snippets and point to the possible vulnerabilities. Thus, identified security gaps can immediately be fixed in FOCUS+.en
dc.identifier.pissn0720-8928
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/40608
dc.language.isoen
dc.publisherGeselllschaft für Informatik e.V.
dc.relation.ispartofSoftwaretechnik-Trends Band 37, Heft 3
dc.subjectCode Exploit
dc.subjectExecution Trace
dc.subjectVulnerability Analysis
dc.titleVulnerability Recognition by Execution Trace Differentiationen
dc.typeText/Journal Article
gi.citation.endPage7
gi.citation.publisherPlaceBonn
gi.citation.startPage5
gi.conference.sessiontitleSonderteil: Proceedings of the 8th Symposium on Software Performance (SSP), Karlsruhe, 09. - 10. November 2017

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
01_Vulnerability_Recognition_by_Execution_Trace_Differentiation.pdf
Größe:
490.09 KB
Format:
Adobe Portable Document Format