Automated Attack Surface Approximation
Title | Automated Attack Surface Approximation |
Publication Type | Conference Paper |
Year of Publication | 2015 |
Authors | Theisen, Christopher |
Conference Name | Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering |
Publisher | ACM |
Conference Location | Bergamo, Italy |
ISBN Number | 978-1-4503-3675-8 |
Keywords | attack surface, Attack Surface and Defense-in-Depth Metrics, crash dumps, Stack traces |
Abstract | While software systems are being developed and released to consumers more rapidly than ever, security remains an important issue for developers. Shorter development cycles means less time for these critical security testing and review efforts. The attack surface of a system is the sum of all paths for untrusted data into and out of a system. Code that lies on the attack surface therefore contains code with actual exploitable vulnerabilities. However, identifying code that lies on the attack surface requires the same contested security resources from the secure testing efforts themselves. My research proposes an automated technique to approximate attack surfaces through the analysis of stack traces. We hypothesize that stack traces user crashes represent activity that puts the system under stress, and is therefore indicative of potential security vulnerabilities. The goal of this research is to aid software engineers in prioritizing security efforts by approximating the attack surface of a system via stack trace analysis. In a trial on Mozilla Firefox, the attack surface approximation selected 8.4% of files and contained 72.1% of known vulnerabilities. A similar trial was performed on the Windows 8 product. |
URL | http://doi.acm.org/10.1145/2786805.2807563 |
DOI | 10.1145/2786805.2807563 |
Citation Key | Theisen:2015:AAS:2786805.2807563 |
Refereed Designation | Refereed |