Automatic Discovery of API-Level Vulnerabilities

dc.contributor.authorGanapathy, Vinoden_US
dc.contributor.authorSeshia, Sanjit A.en_US
dc.contributor.authorJha, Someshen_US
dc.contributor.authorReps, Thomas W.en_US
dc.contributor.authorBryant, Randal E.en_US
dc.date.accessioned2012-03-15T17:18:31Z
dc.date.available2012-03-15T17:18:31Z
dc.date.created2004en_US
dc.date.issued2004en_US
dc.description.abstractA system is vulnerable to an API-level attack if its security can be compromised by invoking an allowed sequence of operations from its API. We present a formal framework to model and analyze APIs, and develop an automatic technique based upon bounded model checking to discover API-level vulnerabilities. If a vulnerability exists, our technique produces a trace of API operations demonstrating an attack. Two case studies show the efficacy of our technique. In the first study we present a novel way to analyze print f-family format-string attacks as MI-level attacks, and implement a tool to discover them automatically. In the second study, we model a subset of the IBM Common Cryptographic Architecture MI, a popular cryptographic key-management API, and automatically detect a previously known vulnerability.en_US
dc.format.mimetypeapplication/pdfen_US
dc.identifier.citationTR1512en_US
dc.identifier.urihttp://digital.library.wisc.edu/1793/60412
dc.publisherUniversity of Wisconsin-Madison Department of Computer Sciencesen_US
dc.titleAutomatic Discovery of API-Level Vulnerabilitiesen_US
dc.typeTechnical Reporten_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
TR1512.pdf
Size:
3.33 MB
Format:
Adobe Portable Document Format