Visible to the public Automated Attack Surface ApproximationConflict Detection Enabled

TitleAutomated Attack Surface Approximation
Publication TypeConference Paper
Year of Publication2015
AuthorsTheisen, Christopher
Conference NameProceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering
PublisherACM
Conference LocationBergamo, Italy
ISBN Number978-1-4503-3675-8
Keywordsattack surface, Attack Surface and Defense-in-Depth Metrics, crash dumps, Stack traces
Abstract

While software systems are being developed and released to consumers more rapidly than ever, security remains an important issue for developers. Shorter development cycles means less time for these critical security testing and review efforts. The attack surface of a system is the sum of all paths for untrusted data into and out of a system. Code that lies on the attack surface therefore contains code with actual exploitable vulnerabilities. However, identifying code that lies on the attack surface requires the same contested security resources from the secure testing efforts themselves. My research proposes an automated technique to approximate attack surfaces through the analysis of stack traces. We hypothesize that stack traces user crashes represent activity that puts the system under stress, and is therefore indicative of potential security vulnerabilities. The goal of this research is to aid software engineers in prioritizing security efforts by approximating the attack surface of a system via stack trace analysis. In a trial on Mozilla Firefox, the attack surface approximation selected 8.4% of files and contained 72.1% of known vulnerabilities. A similar trial was performed on the Windows 8 product.

URLhttp://doi.acm.org/10.1145/2786805.2807563
DOI10.1145/2786805.2807563
Citation KeyTheisen:2015:AAS:2786805.2807563
Refereed DesignationRefereed