Publication | Closed Access
Using Software Structure to Predict Vulnerability Exploitation Potential
12
Citations
20
References
2014
Year
Unknown Venue
Software MaintenanceEngineeringInformation SecuritySoftware EngineeringSoftware StructureSoftware AnalysisVulnerability AnalysisHardware SecurityVulnerability Assessment (Computing)Data ScienceAttack Entry PointsSystems EngineeringVulnerability ExploitationSupport Vector MachinesThreat (Computer)Threat DetectionComputer ScienceSoftware DesignSoftware SecurityProgram AnalysisSoftware TestingThreat Model
Most of the attacks on computer systems are due to the presence of vulnerabilities in software. Recent trends show that number of newly discovered vulnerabilities still continue to be significant. Studies have also shown that the time gap between the vulnerability public disclosure and the release of an automated exploit is getting smaller. Therefore, assessing vulnerabilities exploitability risk is critical as it aids decision-makers prioritize among vulnerabilities, allocate resources, and choose between alternatives. Several methods have recently been proposed in the literature to deal with this challenge. However, these methods are either subjective, requires human involvement in assessing exploitability, or do not scale. In this research, our aim is to first identify vulnerability exploitation risk problem. Then, we introduce a novel vulnerability exploitability metric based on software structure properties viz.: attack entry points, vulnerability location, presence of dangerous system calls, and reachability. Based on our preliminary results, reachability and the presence of dangerous system calls appear to be a good indicator of exploitability. Next, we propose using the suggested metric as feature to construct a model using machine learning techniques for automatically predicting the risk of vulnerability exploitation. To build a vulnerability exploitation model, we propose using Support Vector Machines (SVMs). Once the predictor is built, given unseen vulnerable function and their exploitability features the model can predict whether the given function is exploitable or not.
| Year | Citations | |
|---|---|---|
Page 1
Page 1