Browse > Article
http://dx.doi.org/10.3745/KTCCS.2013.2.9.399

A Study on MS Crash Analyzer  

Noh, Myoung Sun (전남대학교 정보보안협동과정)
Na, Jong Bae (전남대학교 정보보안협동과정)
Jung, Gwang Un (충남대학교 컴퓨터공학과)
Ryou, Jae Cheol (충남대학교 컴퓨터공학과)
Noh, Bong Nam (전남대학교 전자컴퓨터공학부)
Publication Information
KIPS Transactions on Computer and Communication Systems / v.2, no.9, 2013 , pp. 399-404 More about this Journal
Abstract
MSEC(Microsoft Security Engineering Center) performed fuzz testing Windows Vista with 350 million test cases for 14 months before launching it. They analyzed crashes resulted from the testing and developed crash analyzer !exploitable based on the data used to determine exploitability. In this paper, we describe how MS crash analyzer determines exploitability of crashes. Besides, we suggest an improvement to overcome the limitations found in the MS crash analyzer during the analysis.
Keywords
MS Crash Analyzer; Crash Analysis; Vulnerability; Taint Analysis;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Microsoft, "First and Second chance exception handling," 2013년 4월 확인.
2 MSEC, "!exploitable Crash Analyzer - MSEC Debugger Extensions," Mar., 2009.
3 Microsoft Security Engineering Center, "The History of the !exploitable Crash Analyzer," Apr., 2009.
4 Microsoft, "EXCEPTION_RECORD structure," 2012.10, http://msdn.microsoft.com/en-us/library/windows/desktop/aa363082(v=vs.85).aspx
5 J. Newsome and D. Song. "Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software," NDSS '05, Feb., 2005.
6 C. Cowan et al., "StackGuard: automatic adaptive detection and prevention of buffer-overflow attacks," 7th USENIX, Jan., 1998.
7 Alexander Sotirov, "Heap Feng Shui in JavaScript," BlackHat, 2007.
8 Adel Abdouchaev et al., "Analyze Crashes to Find Security Vulnerabilities in Your Apps," Nov., 2007.
9 Jaecheol Ryou et al.,, "A Study on Major Domestic S/W Vulnerability Discovery and Analysis Method," Oct., 2012.