Back to Search Start Over

Static Detection of File Access Control Vulnerabilities on Windows System.

Authors :
Lu, Jiadong
Gu, Fangming
Wang, Yiqi
Chen, Jiahui
Peng, Zhiniang
Wen, Sheng
Source :
Concurrency & Computation: Practice & Experience; 7/25/2022, Vol. 34 Issue 16, p1-18, 18p
Publication Year :
2022

Abstract

Summary: Traditional applications have been developed for decades. Most of the security research around them have focused on the detection of memory corruption vulnerabilities, such as buffer overflow, double fetch, and integer overflow. On the contrary, logic bugs, a kind of flaws caused by unreasonable application logic, attract much less attention. Files are the most common media for programs to persist their data in the system. As the file owners, programs are responsible for protecting their files from malicious users' tampering by leveraging access control mechanisms. However, if a program configures their access control mechanisms in wrong ways and causes evil users to bypass security checks to access files, there exists a file access control vulnerability. As a branch of logic flaws, file access control vulnerabilities are less popular with researchers. Thus, to mitigate the harm of the file access control vulnerabilities on Windows system, our team conducted first‐step research on them. We first classified file access control bugs into two types and codified some bug patterns. Then we formalized file access control vulnerabilities to propose a scalable detection method and implemented a lightweight analysis system StaticFAC. After evaluating StaticFAC in real‐world Windows software, we discovered 15 0‐day bugs. [ABSTRACT FROM AUTHOR]

Subjects

Subjects :
ACCESS control

Details

Language :
English
ISSN :
15320626
Volume :
34
Issue :
16
Database :
Complementary Index
Journal :
Concurrency & Computation: Practice & Experience
Publication Type :
Academic Journal
Accession number :
157642147
Full Text :
https://doi.org/10.1002/cpe.6004