Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures

  • Authors:
  • David Brumley;James Newsome;Dawn Song;Hao Wang;Somesh Jha

  • Affiliations:
  • Carnegie Mellon University, Pittsburgh;Carnegie Mellon University, Pittsburgh;Carnegie Mellon University, Pittsburgh;University of Wisconsin - Madison, Madison;University of Wisconsin - Madison, Madison

  • Venue:
  • IEEE Transactions on Dependable and Secure Computing
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we explore the problem of creating \emph{vulnerability signatures}. A vulnerability signature is based on a program vulnerability, and is not specific to any particular exploit. The advantage of vulnerability signatures is that their quality can be guaranteed. In particular, we create vulnerability signatures which are guaranteed to have zero false positives. We show how to automate signature creation for any vulnerability that can be detected by a runtime monitor. We provide a formal definition of a vulnerability signature, and investigate the computational complexity of creating and matching vulnerability signatures. We systematically explore the design space of vulnerability signatures. We also provide specific techniques for creating vulnerability signatures in a variety of language classes. In order to demonstrate our techniques, we have built a prototype system. Our experiments show that we can, using a single exploit, automatically generate a vulnerability signature as a regular expression, as a small program, or as a system of constraints. We demonstrate techniques for creating signatures of vulnerabilities which can be exploited via multiple program paths. Our results indicate that our approach is a viable option for signature generation, especially when guarantees are desired.