首页> 美国卫生研究院文献>Sensors (Basel Switzerland) >Automated Vulnerability Discovery and Exploitation in the Internet of Things
【2h】

Automated Vulnerability Discovery and Exploitation in the Internet of Things

机译:物联网中的自动漏洞发现和利用

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Recently, automated software vulnerability detection and exploitation in Internet of Things (IoT) has attracted more and more attention, due to IoT’s fast adoption and high social impact. However, the task is challenging and the solutions are non-trivial: the existing methods have limited effectiveness at discovering vulnerabilities capable of compromising IoT systems. To address this, we propose an Automated Vulnerability Discovery and Exploitation framework with a Scheduling strategy, AutoDES that aims to improve the efficiency and effectiveness of vulnerability discovery and exploitation. In the vulnerability discovery stage, we use our Anti-Driller technique to mitigate the “path explosion” problem. This approach first generates a specific input proceeding from symbolic execution based on a Control Flow Graph (CFG). It then leverages a mutation-based fuzzer to find vulnerabilities while avoiding invalid mutations. In the vulnerability exploitation stage, we analyze the characteristics of vulnerabilities and then propose to generate exploits, via the use of several proposed attack techniques that can produce a shell based on the detected vulnerabilities. We also propose a genetic algorithm (GA)-based scheduling strategy (AutoS) that helps with assigning the computing resources dynamically and efficiently. The extensive experimental results on the RHG 2018 challenge dataset and the BCTF-RHG 2019 challenge dataset clearly demonstrate the effectiveness and efficiency of the proposed framework.
机译:最近,由于物联网的快速采用和高度的社会影响,物联网(IoT)中的自动软件漏洞检测和开发已引起越来越多的关注。但是,这项任务具有挑战性,解决方案也不是简单的:现有方法在发现能够破坏物联网系统的漏洞方面效果有限。为解决此问题,我们提出了一种具有计划策略AutoDES的自动漏洞发现和利用框架,该框架旨在提高漏洞发现和利用的效率和有效性。在漏洞发现阶段,我们使用Anti-Driller技术来缓解“路径爆炸”问题。此方法首先根据控制流图(CFG)从符号执行生成特定的输入。然后,它利用基于变异的模糊器来查找漏洞,同时避免无效的变异。在漏洞利用阶段,我们分析漏洞的特征,然后提议通过使用几种建议的攻击技术来生成利用漏洞,这些攻击技术可以根据检测到的漏洞来产生外壳。我们还提出了一种基于遗传算法(GA)的调度策略(AutoS),可帮助动态,高效地分配计算资源。在RHG 2018挑战数据集和BCTF-RHG 2019挑战数据集上的广泛实验结果清楚地证明了所提出框架的有效性和效率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号