Towards automated vulnerability scanning of network servers

Nathan Schagen, Koen Koning, Herbert Bos, Cristiano Giuffrida

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

490 Downloads (Pure)

Abstract

We explore a new technique for safe patch fingerprinting to automate vulnerability scanning of network servers. Our technique helps automate the discovery of inputs that safely discriminate vulnerable from patched servers for the latest vulnerabilities. This enables rapid updates to vulnerability scanning tools as new software vulnerabilities are discovered, allowing administrators to scan and secure their networks more quickly. To ensure such scans are safe and ethical, we need to reject inputs with malicious side effects. We have implemented a framework, based on delta execution, which tests the discriminative property of such inputs, as well as their safety. We use a fuzzer to find promising candidate inputs to further automate the process. To illustrate the potential of this approach, we present a Heartbleed case study.

Original languageEnglish
Title of host publicationProceedings of the 11th European Workshop on Systems Security, EuroSec 2018
PublisherAssociation for Computing Machinery, Inc
Chapter5
Pages1-6
Number of pages6
ISBN (Electronic)9781450356527
DOIs
Publication statusPublished - 2018
Event11th European Workshop on Systems Security, EuroSec 2018 - Porto, Portugal
Duration: 23 Apr 201826 Apr 2018

Publication series

NameProceedings of the ACM Series
PublisherACM

Conference

Conference11th European Workshop on Systems Security, EuroSec 2018
Country/TerritoryPortugal
CityPorto
Period23/04/1826/04/18

Keywords

  • Internet-wide scanning
  • Network security
  • Vulnerability fingerprinting

Fingerprint

Dive into the research topics of 'Towards automated vulnerability scanning of network servers'. Together they form a unique fingerprint.

Cite this