ATLANTIS - Assembly Trace Analysis Environment

PDF

Authors
  1. Cleary, B.
  2. Storey, M.-A.
  3. Chan, L.
  4. Salois, M.
  5. Painchaud, F.
Corporate Authors
Defence R&D Canada - Valcartier, Valcartier QUE (CAN);Victoria Univ, Victoria BC (CAN) Dept of Computer Science
Abstract
For malware authors, software is an ever fruitful source of vulnerabilities to exploit. Exploitability assessment through fuzzing aims to proactively identify potential vulnerabilities by monitoring the execution of a program while attempting to induce a crash. In order to determine if a particular program crash is exploitable (and to create a patch), the root cause of the crash must be identified. For particular classes of programs this analysis must be conducted without the aid of the original source code using execution traces generated at the assembly layer. Currently this analysis is a highly manual, text-driven activity with poor tool support. In this paper we present ATLANTIS, an assembly trace analysis environment that combines many of the features of modern IDEs with novel trace annotation and navigation techniques to support software security engineers performing exploitability analysis.
Report Number
DRDC-VALCARTIER-SL-2012-277 — Scientific Literature
Date of publication
15 Oct 2012
Number of Pages
17
DSTKIM No
CA036937
CANDIS No
536611
Format(s):
Electronic Document(PDF)

Permanent link

Document 1 of 1

Date modified: