Finding the Needle in the Heap: Combining Static Analysis and Dynamic Symbolic Execution to Trigger Use-After-Free - Université Grenoble Alpes Accéder directement au contenu
Communication Dans Un Congrès Année : 2016

Finding the Needle in the Heap: Combining Static Analysis and Dynamic Symbolic Execution to Trigger Use-After-Free

Josselin Feist
  • Fonction : Auteur
  • PersonId : 785694
  • IdRef : 223396761
Laurent Mounier
  • Fonction : Auteur
  • PersonId : 858856
Marie-Laure Potet
  • Fonction : Auteur
Sébastien Bardin
  • Fonction : Auteur
  • PersonId : 755498
  • IdRef : 161083781
Robin David
  • Fonction : Auteur
  • PersonId : 782970
  • IdRef : 200251783

Résumé

This paper presents a fully automated technique to find and trigger Use-After-Free vulnerabilities (UAF) on binary code. The approach combines a static analyzer and a dynamic symbolic execution engine. We also introduce several original heuristics for the dynamic symbolic execution part, speeding up the exploration and making this combination effective in practice. The tool we developed is open-source, and it has successfully been applied on real world vulnerabilities. As an example, we detail a proof-of-concept exploit triggering a previously unknown vulnerability on JasPer leading to the CVE-2015-5221.
Fichier principal
Vignette du fichier
2016-ssprew.pdf (514.27 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-01721539 , version 1 (02-03-2018)

Identifiants

  • HAL Id : hal-01721539 , version 1

Citer

Josselin Feist, Laurent Mounier, Marie-Laure Potet, Sébastien Bardin, Robin David. Finding the Needle in the Heap: Combining Static Analysis and Dynamic Symbolic Execution to Trigger Use-After-Free. SSPREW-6 - 6th Software Security, Protection, and Reverse Engineering Workshop, Dec 2016, Los Angeles, United States. pp.1-12. ⟨hal-01721539⟩
206 Consultations
280 Téléchargements

Partager

Gmail Facebook X LinkedIn More