This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Vulnerability Discovery with Attack Injection
PrePrint
ISSN: 0098-5589
João Antunes, University of Lisboa, Portugal
Nuno Neves, University of Lisboa, Portugal
Miguel Correia, University of Lisboa, Portugal
Paulo Verissimo, University of Lisboa, Portugal
Rui Neves, Universidade Técnica de Lisboa, Portugal
The increasing reliance put on networked computer systems demands for higher levels of dependability. This is even more relevant as new threats and forms of attack are constantly being revealed, compromising the security of systems. The paper addresses this problem by presenting an attack injection methodology for the automatic discovery of vulnerabilities in software components. The proposed methodology, implemented in AJECT, follows an approach similar to hackers and security analysts to discover vulnerabilities in network connected servers. AJECT uses a specification of the server's communication protocol and predefined test case generation algorithms to automatically create a large number of attacks. Then, while it injects these attacks through the network, it monitors the execution of the server in the target system and the responses returned to the clients. The observation of an unexpected behavior suggests the presence of a vulnerability that was triggered by some particular attack (or group of attacks). This attack can then be used to reproduce the anomaly and to assist the removal of the error. To assess the usefulness of this approach, several attack injection campaigns were performed with 16 publicly available POP and IMAP servers. The results show that AJECT could effectively be used to locate vulnerabilities, even on well-known servers tested throughout the years.
Index Terms:
Testing and Debugging, Test design, Testing tools, Experimental Evaluation, Fault Injection, Attack Injection
Citation:
João Antunes, Nuno Neves, Miguel Correia, Paulo Verissimo, Rui Neves, "Vulnerability Discovery with Attack Injection," IEEE Transactions on Software Engineering, 10 June 2010. IEEE computer Society Digital Library. IEEE Computer Society, <http://doi.ieeecomputersociety.org/10.1109/TSE.2010.65>
Usage of this product signifies your acceptance of the Terms of Use.