Automatic detection method of software upgrade vulnerability based on network traffic analysis
During the software upgrade process,the lack of authentication for upgrade information or packages can lead to remote code execution vulnerabilities based on man-in-the-middle attack.An automatic detection method for upgrading vulnerabilities was proposed.The method described the upgrade mechanism b...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2020-02-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2020004 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841529948051865600 |
---|---|
author | Jinhui TENG Yan GUANG Hui SHU Bing ZHANG |
author_facet | Jinhui TENG Yan GUANG Hui SHU Bing ZHANG |
author_sort | Jinhui TENG |
collection | DOAJ |
description | During the software upgrade process,the lack of authentication for upgrade information or packages can lead to remote code execution vulnerabilities based on man-in-the-middle attack.An automatic detection method for upgrading vulnerabilities was proposed.The method described the upgrade mechanism by extracting the network traffic during the upgrade process,then matched it with the vulnerability feature vector to anticipate upgrading vulnerabilities.In a validation environment,the man-in-the-middle attack using the portrait information was carried out to verify the detection results.In addition,an automatic vulnerability analysis and verification system based on this method was designed.184 Windows applications samples was test and 117 upgrade vulnerabilities were detected in these samples,which proved validity of the method. |
format | Article |
id | doaj-art-2757fd0825274acb982defa980dd0a6b |
institution | Kabale University |
issn | 2096-109X |
language | English |
publishDate | 2020-02-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj-art-2757fd0825274acb982defa980dd0a6b2025-01-15T03:13:58ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2020-02-0169410859557987Automatic detection method of software upgrade vulnerability based on network traffic analysisJinhui TENGYan GUANGHui SHUBing ZHANGDuring the software upgrade process,the lack of authentication for upgrade information or packages can lead to remote code execution vulnerabilities based on man-in-the-middle attack.An automatic detection method for upgrading vulnerabilities was proposed.The method described the upgrade mechanism by extracting the network traffic during the upgrade process,then matched it with the vulnerability feature vector to anticipate upgrading vulnerabilities.In a validation environment,the man-in-the-middle attack using the portrait information was carried out to verify the detection results.In addition,an automatic vulnerability analysis and verification system based on this method was designed.184 Windows applications samples was test and 117 upgrade vulnerabilities were detected in these samples,which proved validity of the method.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2020004software upgradenetwork traffic analysisvulnerability detectionautomated analysis and validation |
spellingShingle | Jinhui TENG Yan GUANG Hui SHU Bing ZHANG Automatic detection method of software upgrade vulnerability based on network traffic analysis 网络与信息安全学报 software upgrade network traffic analysis vulnerability detection automated analysis and validation |
title | Automatic detection method of software upgrade vulnerability based on network traffic analysis |
title_full | Automatic detection method of software upgrade vulnerability based on network traffic analysis |
title_fullStr | Automatic detection method of software upgrade vulnerability based on network traffic analysis |
title_full_unstemmed | Automatic detection method of software upgrade vulnerability based on network traffic analysis |
title_short | Automatic detection method of software upgrade vulnerability based on network traffic analysis |
title_sort | automatic detection method of software upgrade vulnerability based on network traffic analysis |
topic | software upgrade network traffic analysis vulnerability detection automated analysis and validation |
url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2020004 |
work_keys_str_mv | AT jinhuiteng automaticdetectionmethodofsoftwareupgradevulnerabilitybasedonnetworktrafficanalysis AT yanguang automaticdetectionmethodofsoftwareupgradevulnerabilitybasedonnetworktrafficanalysis AT huishu automaticdetectionmethodofsoftwareupgradevulnerabilitybasedonnetworktrafficanalysis AT bingzhang automaticdetectionmethodofsoftwareupgradevulnerabilitybasedonnetworktrafficanalysis |