The Coming Era of AlphaHacking? A Survey of Automatic Software Vulnerability Detection, Exploitation and Patching Techniques

05/28/2018
by   Tiantian Ji, et al.
0

With the success of the Cyber Grand Challenge (CGC) sponsored by DARPA, the topic of Autonomous Cyber Reasoning System (CRS) has recently attracted extensive attention from both industry and academia. Utilizing automated system to detect, exploit and patch software vulnerabilities seems so attractive because of its scalability and cost-efficiency compared with the human expert based solution. In this paper, we give an extensive survey of former representative works related to the underlying technologies of a CRS, including vulnerability detection, exploitation and patching. As an important supplement, we then review several pioneer studies that explore the potential of machine learning technologies in this field, and point out that the future development of Autonomous CRS is inseparable from machine learning.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/28/2018

The Coming Era of AlphaHacking?

With the success of the Cyber Grand Challenge (CGC) sponsored by DARPA, ...
research
08/09/2017

Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance

As the size and complexity of software systems increase, the number and ...
research
03/29/2023

Benchmarking Software Vulnerability Detection Techniques: A Survey

Software vulnerabilities can have serious consequences, which is why man...
research
05/09/2023

Enhancing Cyber-Resiliency of DER-based SmartGrid: A Survey

The rapid development of information and communications technology has e...
research
08/07/2022

Cyber Pirates Ahoy! An Analysis of Cybersecurity Challenges in the Shipping Industry

Maritime shipping has become a trillion-dollar industry that now impacts...
research
08/13/2019

Exploit Prediction Scoring System (EPSS)

Despite the massive investments in information security technologies and...
research
03/01/2019

Automatic Techniques to Systematically Discover New Heap Exploitation Primitives

Heap exploitation techniques to abuse the metadata of allocators have be...

Please sign up or login with your details

Forgot password? Click here to reset