Netinfo Security ›› 2022, Vol. 22 ›› Issue (3): 39-52.doi: 10.3969/j.issn.1671-1122.2022.03.005

Previous Articles     Next Articles

Key Technologies and Advances in the Research on Automated Exploitation of Computer System Vulnerabilities

FENG Guangsheng, ZHANG Yizhe(), SUN Jiayu, LYU Hongwu   

  1. 1. College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China
  • Received:2021-12-22 Online:2022-03-10 Published:2022-03-28
  • Contact: ZHANG Yizhe E-mail:995338514@qq.com

Abstract:

The security situation of cyberspace is becoming more and more complex. Security vulnerabilities exploded in the past few decades with the acceleration of software iteration. Facing with the challenge of hidden and numerous vulnerabilities, traditional methods relying on security experts to conduct assessments often requires huge manpower and material resources. Thus, how to efficiently find software vulnerabilities automatically, generate corresponding EXP (exploit) and make subsequent usage have become a hot spot which attracts widespread attention. This paper aims to summarize the latest developments in the automated exploitation of vulnerabilities. First, this paper refines the related technologies for software vulnerabilities automated exploiting. Second, this paper reviews mainstream software vulnerability automated exploitation systems. Finally, this paper analyzes and summarize the current problems and prospect the future research.

Key words: cyberspace, software vulnerabilities, automatic exploit

CLC Number: