High-fidelity Symbolic Execution for Vulnerability Hunting
用于漏洞搜寻的高保真符号执行
基本信息
- 批准号:RGPIN-2022-03325
- 负责人:
- 金额:$ 2.48万
- 依托单位:
- 依托单位国家:加拿大
- 项目类别:Discovery Grants Program - Individual
- 财政年份:2022
- 资助国家:加拿大
- 起止时间:2022-01-01 至 2023-12-31
- 项目状态:已结题
- 来源:
- 关键词:
项目摘要
When adopting symbolic execution for vulnerability hunting, security researchers often face a trade-off between a complete theory and a practical tool. While every effort is made to translate program semantics faithfully, compromises, such as bounded loop unrolling, are often introduced with a presumption that not doing so will overload the backend solver. These compromises make a low-fidelity representation of program semantics, which causes both false alarms and missing bugs. However, throughout the years, practicality has always been on the winning side in the trade-off. Low-fidelity symbolization practices accumulate through generations of symbolic executors even when the limitations no longer exist. Because of this inertia, state-of-the-art tools can hardly claim triumph over any vulnerability type given innumerable ways to trigger false alarms and/or missing bugs. A growing gap between theory and practice is detrimental to the software security line of research. The long-term goal of my research is to close this gap by formalizing the arts of practical vulnerability hunting and building a theoretical framework to explain novelty, composability, and trade-offs of security tools. As a foundational step, the short-term objective focuses on 'theorizing' a specific bug hunting technique--symbolic execution--through the research on HISE, short for High-fidelity Symbolic Execution, as the next generation symbolic executor. Soundness and completeness are first-class citizens in HISE, which is guaranteed by a lossless symbolization procedure that transpiles a program into SMT formulae while preserving all information in the code. This means all practicality workarounds, even those that have been deemed crucial to modern symbolic executors, will be re-examined and revamped with novel techniques. Lossless symbolization unlocks an intriguing opportunity: a common and unambiguous language for all building blocks in the vulnerability hunting pipeline. Example building blocks include approximations of program semantics, solvability optimizations, domain knowledge, and vulnerability modeling. Each building block can be independently developed without losing the chance compose with other building blocks. In this way, practicality compromises can be retrofitted but only in a quantifiable manner. HISE advances software security research by providing a common playground for quantifiable practicality. This enables problem localization, solution composition, and ultimately, evolving the whole field in a holistic way. HISE will also make real-world impacts by finding errors in both traditional software (e.g., the Linux kernel) and new programming paradigms (e.g., smart contracts). This research program will train a batch of highly-skilled security practitioners with rich experience on hunting bugs and building secure software. These candidates will be highly demanded in the job market as cybersecurity gain momentum across industries.
当采用符号执行进行漏洞搜索时,安全研究人员经常面临完整理论和实用工具之间的权衡。虽然尽一切努力忠实地翻译程序语义,但妥协,如有界循环展开,通常是在假设不这样做会使后端求解器过载的情况下引入的。这些妥协使得程序语义的保真度很低,这会导致错误警报和遗漏错误。然而,多年来,实用性一直是权衡中获胜的一方。低保真度的符号化实践通过几代符号执行者的积累,即使限制不再存在。由于这种惯性,最先进的工具很难声称战胜任何漏洞类型,因为有无数种方式触发假警报和/或遗漏错误。理论和实践之间日益扩大的差距不利于软件安全研究。我研究的长期目标是通过正式化实际漏洞狩猎的艺术并建立一个理论框架来解释安全工具的新奇,可组合性和权衡来缩小这一差距。作为基础性步骤,短期目标侧重于通过研究HISE(高保真符号执行的缩写)作为下一代符号执行程序,“理论化”一种特定的错误搜索技术-符号执行。在HISE中,可靠性和完整性是一等公民,这是由无损符号化过程保证的,该过程将程序转换为SMT公式,同时保留代码中的所有信息。这意味着所有的实用性解决方案,即使是那些被认为对现代符号执行器至关重要的解决方案,都将被重新审视,并使用新技术进行改进。无损符号化开启了一个有趣的机会:为漏洞搜索管道中的所有构建块提供一种通用且明确的语言。示例构建块包括程序语义的近似、可解性优化、领域知识和漏洞建模。每个构建块都可以独立开发,而不会失去与其他构建块组合的机会。通过这种方式,可以对实用性妥协进行改造,但只能以可量化的方式进行。HISE通过为可量化的实用性提供一个公共场所来推进软件安全研究。这使得问题本地化,解决方案组合,并最终以整体的方式发展整个领域。HISE还将通过发现传统软件中的错误(例如,Linux内核)和新的编程范例(例如,智能合约)。该研究项目将培养一批高技能的安全从业人员,具有丰富的查杀漏洞和构建安全软件的经验。随着网络安全在各行各业的发展势头,这些候选人将在就业市场上受到高度要求。
项目成果
期刊论文数量(0)
专著数量(0)
科研奖励数量(0)
会议论文数量(0)
专利数量(0)
数据更新时间:{{ journalArticles.updateTime }}
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
数据更新时间:{{ journalArticles.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ monograph.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ sciAawards.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ conferencePapers.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ patent.updateTime }}
Xu, Meng其他文献
On-tissue amidation of sialic acid with aniline for sensitive imaging of sialylated N-glycans from FFPE tissue sections via MALDI mass spectrometry.
- DOI:
10.1007/s00216-022-03894-y - 发表时间:
2022-07 - 期刊:
- 影响因子:4.3
- 作者:
Zhang, Hua;Shi, Xudong;Liu, Yuan;Wang, Bin;Xu, Meng;Welham, Nathan, V;Li, Lingjun - 通讯作者:
Li, Lingjun
Hydrophobic Modification of Wood Using Tetramethylcyclotetrasiloxane.
- DOI:
10.3390/polym14102077 - 发表时间:
2022-05-19 - 期刊:
- 影响因子:5
- 作者:
Tang, Mingwei;Fang, Xueren;Li, Bowen;Xu, Meng;Wang, Haiyan;Cai, Shuang - 通讯作者:
Cai, Shuang
Effectiveness of Multicomponent Interventions in Office-Based Workers to Mitigate Occupational Sedentary Behavior: Systematic Review and Meta-Analysis.
- DOI:
10.2196/44745 - 发表时间:
2023-07-26 - 期刊:
- 影响因子:8.5
- 作者:
Zhou, Liying;Deng, Xinxin;Guo, Kangle;Hou, Liangying;Hui, Xu;Wu, Yanan;Xu, Meng;Wang, Yongsheng;Liang, Shanshan;Yang, Kehu;Li, Xiuxia - 通讯作者:
Li, Xiuxia
AE detection for pipeline valve leakage based on HHT
基于HHT的管道阀门泄漏AE检测
- DOI:
- 发表时间:
2012 - 期刊:
- 影响因子:0
- 作者:
Liu, Gui-Jie;Xu, Meng;Wang, Xin;Jiang, Rui-Lin - 通讯作者:
Jiang, Rui-Lin
Malignant melanoma resection and reconstruction with the first manifestation of lumbar metastasis: A case report.
- DOI:
10.12998/wjcc.v11.i15.3571 - 发表时间:
2023-05-26 - 期刊:
- 影响因子:1.1
- 作者:
Guo, Zi-Xuan;Zhao, Xue-Lin;Zhao, Zi-Yi;Zhu, Qing-Yan;Wang, Zi-Ying;Xu, Meng - 通讯作者:
Xu, Meng
Xu, Meng的其他文献
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
{{ truncateString('Xu, Meng', 18)}}的其他基金
High-fidelity Symbolic Execution for Vulnerability Hunting
用于漏洞搜寻的高保真符号执行
- 批准号:
DGECR-2022-00364 - 财政年份:2022
- 资助金额:
$ 2.48万 - 项目类别:
Discovery Launch Supplement
相似海外基金
SaTC: CORE: Medium: Symbolizing Viability: Paving the Road to Practical Symbolic Execution
SaTC:核心:中:象征可行性:为实际象征执行铺平道路
- 批准号:
2247954 - 财政年份:2023
- 资助金额:
$ 2.48万 - 项目类别:
Standard Grant
FMitF: Track II: Cybolic: a symbolic execution technique and tool for analyzing CMake build scripts
FMITF:轨道 II:Cybolic:用于分析 CMake 构建脚本的符号执行技术和工具
- 批准号:
2319131 - 财政年份:2023
- 资助金额:
$ 2.48万 - 项目类别:
Standard Grant
Practical Symbolic Execution for Rust
Rust 的实用符号执行
- 批准号:
580524-2022 - 财政年份:2022
- 资助金额:
$ 2.48万 - 项目类别:
Alliance Grants
A symbolic execution engine for improved proof automation in machine-checked cryptography
用于改进机器检查密码学证明自动化的符号执行引擎
- 批准号:
2765784 - 财政年份:2022
- 资助金额:
$ 2.48万 - 项目类别:
Studentship
High-fidelity Symbolic Execution for Vulnerability Hunting
用于漏洞搜寻的高保真符号执行
- 批准号:
DGECR-2022-00364 - 财政年份:2022
- 资助金额:
$ 2.48万 - 项目类别:
Discovery Launch Supplement
Practical Symbolic Execution for Rust
Rust 的实用符号执行
- 批准号:
573705-2022 - 财政年份:2022
- 资助金额:
$ 2.48万 - 项目类别:
University Undergraduate Student Research Awards
Automatic generation of programming questions by symbolic execution
通过符号执行自动生成编程题
- 批准号:
20K12106 - 财政年份:2020
- 资助金额:
$ 2.48万 - 项目类别:
Grant-in-Aid for Scientific Research (C)
SaTC: EDU: Curricula and CTF Exercises for Teaching Smart Fuzzing and Symbolic Execution
SaTC:EDU:用于教授智能模糊测试和符号执行的课程和 CTF 练习
- 批准号:
1821841 - 财政年份:2018
- 资助金额:
$ 2.48万 - 项目类别:
Standard Grant
Improving Symbolic Execution via Targeted Program Transformations
通过有针对性的程序转换改进符号执行
- 批准号:
EP/N007166/1 - 财政年份:2016
- 资助金额:
$ 2.48万 - 项目类别:
Research Grant
CSR: Medium: Augmenting Logs with Static Analysis and Symbolic Execution
CSR:中:通过静态分析和符号执行增强日志
- 批准号:
1564274 - 财政年份:2016
- 资助金额:
$ 2.48万 - 项目类别:
Continuing Grant