Automated Reduction of Attack Surface Using Call Graph Enumeration
Title | Automated Reduction of Attack Surface Using Call Graph Enumeration |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Ando, Ruo |
Conference Name | Proceedings of the 2018 2Nd International Conference on Management Engineering, Software Engineering and Service Sciences |
Date Published | January 2018 |
Publisher | ACM |
ISBN Number | 978-1-4503-5431-8 |
Keywords | attack surface, Automated reduction, call graph, composability, CVE-2013-4371, edge detection, Metrics, pubcrawl, resilience, Resiliency, Scalability, security, user-after-free, Xen |
Abstract | There have been many research efforts on detecting vulnerability such as model checking and formal method. However, according to Rice's theorem, checking whether a program contains vulnerable code by static checking is undecidable in general. In this paper, we propose a method of attack surface reduction using enumeration of call graph. Proposal system is divided into two steps: enumerating edge E[Function Fi, Function Fi+1] and constructing call graph by recursive search of [E1, E2, En]. Proposed method enables us to find the sum of paths of which leaf node is vulnerable function VF. Also, root node RF of call graph is part of program which is open to attacker. Therefore, call graph [VF, RF] can be eliminated according the situation where the program is running. We apply proposal method to the real programs (Xen) and extracts the attack surface of CVE-2013-4371. These vulnerabilities are classified into two class: use-after-free and assertion failure. Also, numerical result is shown in searching attack surface of Xen with different search depth of constructing call graph. |
URL | https://dl.acm.org/doi/10.1145/3180374.3181327 |
DOI | 10.1145/3180374.3181327 |
Citation Key | ando_automated_2018 |