2009 22nd IEEE Computer Security Foundations Symposium (2009)
Port Jefferson, New York
July 8, 2009 to July 10, 2009
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/CSF.2009.13
As networked systems grow in complexity, they are increasingly vulnerable to denial-of-service (DoS) attacks involving resource exhaustion. A single malicious "input of coma" can trigger high-complexity behavior such as deep recursion in a carelessly implemented server, exhausting CPU time or stack space and making the server unavailable to legitimate clients. These DoS attacks exploit the semantics of the target application, are rarely associated with network traffic anomalies, and are thus extremely difficult to detect using conventional methods.We present SAFER, a static analysis tool for identifying potential DoS vulnerabilities and the root causes of resource-exhaustion attacks before the software is deployed. Our tool combines taint analysis with control dependency analysis to detect high-complexity control structures whose execution can be triggered by untrusted network inputs.When evaluated on real-world networked applications, SAFER discovered previously unknown DoS vulnerabilities in the Expat XML parser and the SQLite library, as well as a new attack on a previously patched version of the wu-ftpd server. This demonstrates the importance of understanding and repairing the root causes of DoS vulnerabilities rather than simply blocking known malicious inputs.
Denial-of-service, static analysis, network security
R. Chang, G. Jiang, S. Sankaranarayanan, V. Shmatikov and F. Ivancic, "Inputs of Coma: Static Detection of Denial-of-Service Vulnerabilities," 2009 22nd IEEE Computer Security Foundations Symposium(CSF), Port Jefferson, New York, 2009, pp. 186-199.