• English
  • Deutsch
  • Log In
    Password Login
    Research Outputs
    Fundings & Projects
    Researchers
    Institutes
    Statistics
Repository logo
Fraunhofer-Gesellschaft
  1. Home
  2. Fraunhofer-Gesellschaft
  3. Konferenzschrift
  4. Language-agnostic injection detection
 
  • Details
  • Full
Options
2020
Conference Paper
Title

Language-agnostic injection detection

Abstract
Formal languages are ubiquitous wherever software systems need to exchange or store data. Unparsing into and parsing from such languages is an error-prone process that has spawned an entire class of security vulnerabilities. There has been ample research into finding vulnerabilities on the parser side, but outside of language specific approaches, few techniques targeting unparser vulnerabilities exist. This work presents a language-agnostic approach for spotting injection vulnerabilities in unparsers. It achieves this by mining unparse trees using dynamic taint analysis to extract language keywords, which are leveraged for guided fuzzing. Vulnerabilities can thus be found without requiring prior knowledge about the formal language, and in fact, the approach is even applicable where no specification thereof exists at all. This empowers security researchers and developers alike to gain deeper understanding of unparser implementations through examination of the unparse trees generated by the approach, as well as enabling them to find new vulnerabilities in poorly-understood software. This work presents a language-agnostic approach for spotting injection vulnerabilities in unparsers. It achieves this by mining unparse trees using dynamic taint analysis to extract language keywords, which are leveraged for guided fuzzing. Vulnerabilities can thus be found without requiring prior knowledge about the formal language, and in fact, the approach is even applicable where no specification thereof exists at all. This empowers security researchers and developers alike to gain deeper understanding of unparser implementations through examination of the unparse trees generated by the approach, as well as enabling them to find new vulnerabilities in poorly-understood software.
Author(s)
Hermerschmidt, L.
Straub, A.
Piskachev, G.
Mainwork
IEEE Symposium on Security and Privacy Workshops, SPW 2020. Proceedings  
Conference
Symposium on Security and Privacy (SP) 2020  
Workshop on Language-Theoretic Security (LangSec) 2020  
Open Access
DOI
10.1109/SPW50608.2020.00060
Additional link
Full text
Language
English
Fraunhofer-Institut für Entwurfstechnik Mechatronik IEM  
  • Cookie settings
  • Imprint
  • Privacy policy
  • Api
  • Contact
© 2024