Automatic detection method of software upgrade vulnerability based on network traffic analysis

During the software upgrade process,the lack of authentication for upgrade information or packages can lead to remote code execution vulnerabilities based on man-in-the-middle attack.An automatic detection method for upgrading vulnerabilities was proposed.The method described the upgrade mechanism b...

Full description

Saved in:
Bibliographic Details
Main Authors: Jinhui TENG, Yan GUANG, Hui SHU, Bing ZHANG
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2020-02-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2020004
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529948051865600
author Jinhui TENG
Yan GUANG
Hui SHU
Bing ZHANG
author_facet Jinhui TENG
Yan GUANG
Hui SHU
Bing ZHANG
author_sort Jinhui TENG
collection DOAJ
description During the software upgrade process,the lack of authentication for upgrade information or packages can lead to remote code execution vulnerabilities based on man-in-the-middle attack.An automatic detection method for upgrading vulnerabilities was proposed.The method described the upgrade mechanism by extracting the network traffic during the upgrade process,then matched it with the vulnerability feature vector to anticipate upgrading vulnerabilities.In a validation environment,the man-in-the-middle attack using the portrait information was carried out to verify the detection results.In addition,an automatic vulnerability analysis and verification system based on this method was designed.184 Windows applications samples was test and 117 upgrade vulnerabilities were detected in these samples,which proved validity of the method.
format Article
id doaj-art-2757fd0825274acb982defa980dd0a6b
institution Kabale University
issn 2096-109X
language English
publishDate 2020-02-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-2757fd0825274acb982defa980dd0a6b2025-01-15T03:13:58ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2020-02-0169410859557987Automatic detection method of software upgrade vulnerability based on network traffic analysisJinhui TENGYan GUANGHui SHUBing ZHANGDuring the software upgrade process,the lack of authentication for upgrade information or packages can lead to remote code execution vulnerabilities based on man-in-the-middle attack.An automatic detection method for upgrading vulnerabilities was proposed.The method described the upgrade mechanism by extracting the network traffic during the upgrade process,then matched it with the vulnerability feature vector to anticipate upgrading vulnerabilities.In a validation environment,the man-in-the-middle attack using the portrait information was carried out to verify the detection results.In addition,an automatic vulnerability analysis and verification system based on this method was designed.184 Windows applications samples was test and 117 upgrade vulnerabilities were detected in these samples,which proved validity of the method.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2020004software upgradenetwork traffic analysisvulnerability detectionautomated analysis and validation
spellingShingle Jinhui TENG
Yan GUANG
Hui SHU
Bing ZHANG
Automatic detection method of software upgrade vulnerability based on network traffic analysis
网络与信息安全学报
software upgrade
network traffic analysis
vulnerability detection
automated analysis and validation
title Automatic detection method of software upgrade vulnerability based on network traffic analysis
title_full Automatic detection method of software upgrade vulnerability based on network traffic analysis
title_fullStr Automatic detection method of software upgrade vulnerability based on network traffic analysis
title_full_unstemmed Automatic detection method of software upgrade vulnerability based on network traffic analysis
title_short Automatic detection method of software upgrade vulnerability based on network traffic analysis
title_sort automatic detection method of software upgrade vulnerability based on network traffic analysis
topic software upgrade
network traffic analysis
vulnerability detection
automated analysis and validation
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2020004
work_keys_str_mv AT jinhuiteng automaticdetectionmethodofsoftwareupgradevulnerabilitybasedonnetworktrafficanalysis
AT yanguang automaticdetectionmethodofsoftwareupgradevulnerabilitybasedonnetworktrafficanalysis
AT huishu automaticdetectionmethodofsoftwareupgradevulnerabilitybasedonnetworktrafficanalysis
AT bingzhang automaticdetectionmethodofsoftwareupgradevulnerabilitybasedonnetworktrafficanalysis