AutoCTF: Creating Diverse Pwnables via Automated Bug Injection
نویسندگان
چکیده
Capture the Flag (CTF) is a popular computer security exercise in which teams competitively attack and/or defend programs in real time. CTFs are currently expensive to build and run; each is a bespoke affair, with challenges and vulnerabilities crafted by experts. This not only limits the educational value for players but also restricts what researchers can learn about human activities during the competition. In this work, we take steps towards making CTFs cheap and reusable by extending our LAVA bug injection system to add exploitable vulnerabilities, enabling rapid generation of new CTF challenges. New LAVA bug types, including memory corruption and address disclosure, form a sufficient set of primitives for program exploitation. We used these techniques to create AutoCTF, a weeklong event involving teams from four universities. In order to assess how AutoCTF differed from a handmade CTF we conducted surveys and semi-structured interviews after the event. We evaluated both challenge realism and relative effort expended on bug finding and exploit development. Our preliminary results indicate that AutoCTF can form the basis for cost-effective and reusable CTFs, allowing them to be run often and easily. These CTFs can be used to train new generations of security researchers and provide empirical data on human vulnerability discovery and exploit development.
منابع مشابه
Applying Cyc: Using the Knowledge-Based Data Monitor to Track Tests and Defects
An application of the Cyc system is described, in which the system contributes to the software engineering effort involved in its own construction. Using its Semantic Knowledge Source Integration (SKSI) facility, Cyc interacts with bug reports tracked using the standard Bugzilla defect management system, performing actions such as post-bug-fix tests, and creating and reopening bugs reports as n...
متن کاملDopamine- induced hypophagia is mediated via NMDA and mGlu1 receptors in chicken
Background: Feeding behavior is regulated by a complex network which interacts via diverse signals from central and peripheral tissues. It is known dopaminergic and glutamatergic systems have crucial role on food intake regulation but scarce reports exist on their interaction in appetite regulation in broilers. OBJECTIVES: The present study was designed to examine the role of glutamatergic syst...
متن کاملEnhancing Automated Fault Discovery and Analysis
ENHANCING AUTOMATED FAULT DISCOVERY AND ANALYSIS By Jared David DeMott Creating quality software is difficult. Likewise, offensive researchers look to penetrate quality software. Both parties benefit from a scalable bug hunting framework. Once bugs are found, an equally expensive task is debugging. To debug faults, analysts must identify statements involved in the failures and select suspicious...
متن کاملAutomated Template-Based Metadata Extraction Architecture
This paper describes our efforts to develop a toolset and process for automated metadata extraction from large, diverse, and evolving document collections. A number of federal agencies, universities, laboratories, and companies are placing their collections online and making them searchable via metadata fields such as author, title, and publishing organization. Manually creating metadata for a ...
متن کاملOSSMETER: Automated Measurement and Analysis of Open Source Software
Deciding whether an open source software (OSS) meets the required standards for adoption in terms of quality, maturity, activity of development and user support is not a straightforward process. It involves analysing various sources of information, including the project’s source code repositories, communication channels, and bug tracking systems. OSSMETER extends state-of-the-art techniques in ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017