22C3 - 2.2
22nd Chaos Communication Congress
Private Investigations
Speakers | |
---|---|
Martin Vuagnoux |
Schedule | |
---|---|
Day | 2 |
Room | Saal 3 |
Start time | 22:00 |
Duration | 01:00 |
Info | |
ID | 606 |
Event type | Lecture |
Track | Hacking |
Language | English |
Feedback | |
---|---|
Did you attend this event? Give Feedback |
Autodafé: An Act of Software Torture
Presentation of an innovative buffer overflow uncovering technique called "Fuzzing by weighting attacks with markers"
Automated vulnerability searching tools have led to a dramatic increase of the rate at which such flaws are discovered. One particular searching technique is fault injection – i.e. insertion of random data into input files, buffers or protocol packets, combined with a systematic monitoring of memory violations. Even if these tools allow to uncover a lot of vulnerabilities, they are still very primitive; despite their poor efficiency, they are useful because of the very high density of such vulnerabilities in modern software.
This paper presents an innovative buffer overflow uncovering technique, which uses a more thorough and reliable approach. This technique, called "fuzzing by weighting attacks with markers", is a specialized kind of fault injection, which does not need source code or special compilation for the monitored program. As a proof of concept of the efficiency of this technique, a tool called Autodafé has been developed. It allows to detect automatically an impressive number of buffer overflow vulnerabilities.