Visible to the public Chainsaw: Chained Automated Workflow-based Exploit Generation

TitleChainsaw: Chained Automated Workflow-based Exploit Generation
Publication TypeConference Paper
Year of Publication2016
AuthorsAlhuzali, Abeer, Eshete, Birhanu, Gjomemo, Rigel, Venkatakrishnan, V.N.
Conference NameProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
Date PublishedOctober 2016
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4139-4
Keywordscomposability, exploit generation, Human Behavior, injection vulnerabilities, Metrics, pubcrawl, relational database security, Resiliency, web security
Abstract

We tackle the problem of automated exploit generation for web applications. In this regard, we present an approach that significantly improves the state-of-art in web injection vulnerability identification and exploit generation. Our approach for exploit generation tackles various challenges associated with typical web application characteristics: their multi-module nature, interposed user input, and multi-tier architectures using a database backend. Our approach develops precise models of application workflows, database schemas, and native functions to achieve high quality exploit generation. We implemented our approach in a tool called Chainsaw. Chainsaw was used to analyze 9 open source applications and generated over 199 first- and second-order injection exploits combined, significantly outperforming several related approaches.

URLhttps://dl.acm.org/doi/10.1145/2976749.2978380
DOI10.1145/2976749.2978380
Citation Keyalhuzali_chainsaw:_2016