Cargando…
Automated Vulnerability Discovery and Exploitation in the Internet of Things †
Recently, automated software vulnerability detection and exploitation in Internet of Things (IoT) has attracted more and more attention, due to IoT’s fast adoption and high social impact. However, the task is challenging and the solutions are non-trivial: the existing methods have limited effectiven...
Autores principales: | , , , , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2019
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6696294/ https://www.ncbi.nlm.nih.gov/pubmed/31370171 http://dx.doi.org/10.3390/s19153362 |
_version_ | 1783444236723552256 |
---|---|
author | Wang, Zhongru Zhang, Yuntao Tian, Zhihong Ruan, Qiang Liu, Tong Wang, Haichen Liu, Zhehui Lin, Jiayi Fang, Binxing Shi, Wei |
author_facet | Wang, Zhongru Zhang, Yuntao Tian, Zhihong Ruan, Qiang Liu, Tong Wang, Haichen Liu, Zhehui Lin, Jiayi Fang, Binxing Shi, Wei |
author_sort | Wang, Zhongru |
collection | PubMed |
description | Recently, automated software vulnerability detection and exploitation in Internet of Things (IoT) has attracted more and more attention, due to IoT’s fast adoption and high social impact. However, the task is challenging and the solutions are non-trivial: the existing methods have limited effectiveness at discovering vulnerabilities capable of compromising IoT systems. To address this, we propose an Automated Vulnerability Discovery and Exploitation framework with a Scheduling strategy, AutoDES that aims to improve the efficiency and effectiveness of vulnerability discovery and exploitation. In the vulnerability discovery stage, we use our Anti-Driller technique to mitigate the “path explosion” problem. This approach first generates a specific input proceeding from symbolic execution based on a Control Flow Graph (CFG). It then leverages a mutation-based fuzzer to find vulnerabilities while avoiding invalid mutations. In the vulnerability exploitation stage, we analyze the characteristics of vulnerabilities and then propose to generate exploits, via the use of several proposed attack techniques that can produce a shell based on the detected vulnerabilities. We also propose a genetic algorithm (GA)-based scheduling strategy (AutoS) that helps with assigning the computing resources dynamically and efficiently. The extensive experimental results on the RHG 2018 challenge dataset and the BCTF-RHG 2019 challenge dataset clearly demonstrate the effectiveness and efficiency of the proposed framework. |
format | Online Article Text |
id | pubmed-6696294 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2019 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-66962942019-09-05 Automated Vulnerability Discovery and Exploitation in the Internet of Things † Wang, Zhongru Zhang, Yuntao Tian, Zhihong Ruan, Qiang Liu, Tong Wang, Haichen Liu, Zhehui Lin, Jiayi Fang, Binxing Shi, Wei Sensors (Basel) Article Recently, automated software vulnerability detection and exploitation in Internet of Things (IoT) has attracted more and more attention, due to IoT’s fast adoption and high social impact. However, the task is challenging and the solutions are non-trivial: the existing methods have limited effectiveness at discovering vulnerabilities capable of compromising IoT systems. To address this, we propose an Automated Vulnerability Discovery and Exploitation framework with a Scheduling strategy, AutoDES that aims to improve the efficiency and effectiveness of vulnerability discovery and exploitation. In the vulnerability discovery stage, we use our Anti-Driller technique to mitigate the “path explosion” problem. This approach first generates a specific input proceeding from symbolic execution based on a Control Flow Graph (CFG). It then leverages a mutation-based fuzzer to find vulnerabilities while avoiding invalid mutations. In the vulnerability exploitation stage, we analyze the characteristics of vulnerabilities and then propose to generate exploits, via the use of several proposed attack techniques that can produce a shell based on the detected vulnerabilities. We also propose a genetic algorithm (GA)-based scheduling strategy (AutoS) that helps with assigning the computing resources dynamically and efficiently. The extensive experimental results on the RHG 2018 challenge dataset and the BCTF-RHG 2019 challenge dataset clearly demonstrate the effectiveness and efficiency of the proposed framework. MDPI 2019-07-31 /pmc/articles/PMC6696294/ /pubmed/31370171 http://dx.doi.org/10.3390/s19153362 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Wang, Zhongru Zhang, Yuntao Tian, Zhihong Ruan, Qiang Liu, Tong Wang, Haichen Liu, Zhehui Lin, Jiayi Fang, Binxing Shi, Wei Automated Vulnerability Discovery and Exploitation in the Internet of Things † |
title | Automated Vulnerability Discovery and Exploitation in the Internet of Things † |
title_full | Automated Vulnerability Discovery and Exploitation in the Internet of Things † |
title_fullStr | Automated Vulnerability Discovery and Exploitation in the Internet of Things † |
title_full_unstemmed | Automated Vulnerability Discovery and Exploitation in the Internet of Things † |
title_short | Automated Vulnerability Discovery and Exploitation in the Internet of Things † |
title_sort | automated vulnerability discovery and exploitation in the internet of things † |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6696294/ https://www.ncbi.nlm.nih.gov/pubmed/31370171 http://dx.doi.org/10.3390/s19153362 |
work_keys_str_mv | AT wangzhongru automatedvulnerabilitydiscoveryandexploitationintheinternetofthings AT zhangyuntao automatedvulnerabilitydiscoveryandexploitationintheinternetofthings AT tianzhihong automatedvulnerabilitydiscoveryandexploitationintheinternetofthings AT ruanqiang automatedvulnerabilitydiscoveryandexploitationintheinternetofthings AT liutong automatedvulnerabilitydiscoveryandexploitationintheinternetofthings AT wanghaichen automatedvulnerabilitydiscoveryandexploitationintheinternetofthings AT liuzhehui automatedvulnerabilitydiscoveryandexploitationintheinternetofthings AT linjiayi automatedvulnerabilitydiscoveryandexploitationintheinternetofthings AT fangbinxing automatedvulnerabilitydiscoveryandexploitationintheinternetofthings AT shiwei automatedvulnerabilitydiscoveryandexploitationintheinternetofthings |