作者
Carter Yagemann, Matthew Pruett, Simon P Chung, Kennon Bittick, Brendan Saltaformaggio, Wenke Lee
发表日期
2021
研讨会论文
Proceedings of the 30th USENIX Security Symposium (USENIX Security '21)
页码范围
1989-2006
简介
End-host runtime monitors (eg, CFI, system call IDS) flag processes in response to symptoms of a possible attack. Unfortunately, the symptom (eg, invalid control transfer) may occur long after the root cause (eg, buffer overflow), creating a gap whereby bug reports received by developers contain (at best) a snapshot of the process long after it executed the buggy instructions. To help system administrators provide developers with more concise reports, we propose ARCUS, an automated framework that performs root cause analysis over the execution flagged by the end-host monitor. ARCUS works by testing “what if” questions to detect vulnerable states, systematically localizing bugs to their concise root cause while finding additional enforceable checks at the program binary level to demonstrably block them. Using hardware-supported processor tracing, ARCUS decouples the cost of analysis from host performance.
引用总数
学术搜索中的文章
C Yagemann, M Pruett, SP Chung, K Bittick… - 30th USENIX Security Symposium (USENIX Security …, 2021