Journal on Communications ›› 2022, Vol. 43 ›› Issue (1): 83-95.doi: 10.11959/j.issn.1000-436x.2022003

• Papers • Previous Articles     Next Articles

Automatic exploitation generation method of write-what-where vulnerability

Huafeng HUANG1,2, Purui SU1,2, Yi YANG1,2, Xiangkun JIA1,2   

  1. 1 Trusted Computing and Information Assurance Laboratory, Institute of Software Chinese Academy of Sciences, Beijing 100190, China
    2 School of Computer Science and Technology, University of Chinese Academy of Sciences, Beijing 100190, China
  • Revised:2021-12-17 Online:2022-01-25 Published:2022-01-01
  • Supported by:
    The National Natural Science Foundation of China(U1736209);The National Natural Science Foundation of China(61572483);The National Natural Science Foundation of China(U1836117);The National Natural Science Foundation of China(U1836113);The National Natural Science Foundation of China(62102406);The Strategic Priority Research Program of the Chinese Academy of Sciences(XDC02020300)

Abstract:

To solve the problem that the current vulnerability automatic exploitation generation methods cannot automatically generate control-flow-hijacking exploitation from write-what-where, a method of automatic exploitation generation for write-what-where was proposed.First, the write-what-where vulnerability was detected based on the memory address control strength dynamic taint analysis method.Then, the vulnerability exploitation elements were searched based on the vulnerability exploitation modes, and the exploitation of write-what-where vulnerability was generated automatically by constraint solving.The experimental results show that the proposed method can effectively detect write-what-where vulnerability, search exploitation elements, and automatically generate the control-flow-hijacking exploitation from write-what-where.

Key words: write-what-where, control flow hijacking, dynamic taint analysis, vulnerability exploitation element, auto-matic exploitation generation

CLC Number: 

No Suggested Reading articles found!