Analysis of the CRAX Vulnerability Automatic Utilization Process

Zhao Chao, Pan Zulie, Huang Zhao, Huang Hui

2019

Abstract

In recent years, the number of software vulnerabilities has been on the rise, and the harm of software vulnerabilities has become more and more serious. However, there are so many software vulnerabilities that simple manual analysis cannot meet the requirements. In view of the above problems, this paper introduces CRAX. CRAX is a new framework based on symbolic execution. And it is to act as a backend of static/dynamic program analyzers, bug finders, fuzzers, and crash report database. It can automatically, efficiently and quickly analyze software vulnerabilities and generate stable and efficient test cases. The paper analyzes CRAX's automatic analysis process of vulnerability program and the generation process of test cases in detail, and in chapter 3 and chapter 4, it emphatically introduces the constraint construction and reconstruction process in the process of CRAX's automatic analysis.

Download


Paper Citation


in Harvard Style

Chao Z., Zulie P., Zhao H. and Hui H. (2019). Analysis of the CRAX Vulnerability Automatic Utilization Process.In Proceedings of the International Conference on Advances in Computer Technology, Information Science and Communications - Volume 1: CTISC, ISBN 978-989-758-357-5, pages 32-37. DOI: 10.5220/0008097100320037


in Bibtex Style

@conference{ctisc19,
author={Zhao Chao and Pan Zulie and Huang Zhao and Huang Hui},
title={Analysis of the CRAX Vulnerability Automatic Utilization Process},
booktitle={Proceedings of the International Conference on Advances in Computer Technology, Information Science and Communications - Volume 1: CTISC,},
year={2019},
pages={32-37},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0008097100320037},
isbn={978-989-758-357-5},
}


in EndNote Style

TY - CONF

JO - Proceedings of the International Conference on Advances in Computer Technology, Information Science and Communications - Volume 1: CTISC,
TI - Analysis of the CRAX Vulnerability Automatic Utilization Process
SN - 978-989-758-357-5
AU - Chao Z.
AU - Zulie P.
AU - Zhao H.
AU - Hui H.
PY - 2019
SP - 32
EP - 37
DO - 10.5220/0008097100320037