Sciweavers

Share
TSE
2010

Vulnerability Discovery with Attack Injection

8 years 5 months ago
Vulnerability Discovery with Attack Injection
The increasing reliance put on networked computer systems demands higher levels of dependability. This is even more relevant as new threats and forms of attack are constantly being revealed, compromising the security of systems. This paper addresses this problem by presenting an attack injection methodology for the automatic discovery of vulnerabilities in software components. The proposed methodology, implemented in AJECT, follows an approach similar to hackers and security analysts to discover vulnerabilities in network-connected servers. AJECT uses a specification of the server's communication protocol and predefined test case generation algorithms to automatically create a large number of attacks. Then, while it injects these attacks through the network, it monitors the execution of the server in the target system and the responses returned to the clients. The observation of an unexpected behavior suggests the presence of a vulnerability that was triggered by some particular a...
João Antunes, Nuno Ferreira Neves, Miguel C
Added 22 May 2011
Updated 22 May 2011
Type Journal
Year 2010
Where TSE
Authors João Antunes, Nuno Ferreira Neves, Miguel Correia, Paulo Veríssimo, Rui Neves
Comments (0)
books