DocumentCode :
1634982
Title :
Approximating Attack Surfaces with Stack Traces
Author :
Theisen, Christopher ; Herzig, Kim ; Morrison, Patrick ; Murphy, Brendan ; Williams, Laurie
Author_Institution :
Dept. of Comput. Sci., NCSU, Raleigh, NC, USA
Volume :
2
fYear :
2015
Firstpage :
199
Lastpage :
208
Abstract :
Security testing and reviewing efforts are a necessity for software projects, but are time-consuming and expensive to apply. Identifying vulnerable code supports decision-making during all phases of software development. An approach for identifying vulnerable code is to identify its attack surface, the sum of all paths for untrusted data into and out of a system. Identifying the code that lies on the attack surface requires expertise and significant manual effort. This paper proposes an automated technique to empirically approximate attack surfaces through the analysis of stack traces. We hypothesize that stack traces from user-initiated crashes have several desirable attributes for measuring attack surfaces. The goal of this research is to aid software engineers in prioritizing security efforts by approximating the attack surface of a system via stack trace analysis. In a trial on Windows 8, the attack surface approximation selected 48.4% of the binaries and contained 94.6% of known vulnerabilities. Compared with vulnerability prediction models (VPMs) run on the entire codebase, VPMs run on the attack surface approximation improved recall from .07 to .1 for binaries and from .02 to .05 for source files. Precision remained at .5 for binaries, while improving from .5 to .69 for source files.
Keywords :
decision making; program diagnostics; project management; software engineering; Windows 8; attack surface approximation; attack surface measurement; decision-making; effort reviewing; security testing; software development; software projects; stack trace analysis; vulnerable code identification; Approximation methods; Computer crashes; Measurement; Predictive models; Security; Software; Surface treatment; attack surface; models; reliability; security; stack traces; testing; vulnerability;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Software Engineering (ICSE), 2015 IEEE/ACM 37th IEEE International Conference on
Conference_Location :
Florence
Type :
conf
DOI :
10.1109/ICSE.2015.148
Filename :
7202964
Link To Document :
بازگشت