[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3322431.3326331acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
keynote
Public Access

History and Future of Automated Vulnerability Analysis

Published: 28 May 2019 Publication History

Abstract

The software upon which our modern society operates is riddled with security vulnerabilities. These vulnerabilities allow hackers access to our sensitive data and make our system insecure. To identify vulnerabilities in software, human experts, or vulnerability researchers, are employed. These human experts are quite expensive. And, more fundamentally, human experts cannot analyze every change made to every piece of software (any of which could introduce a security vulnerability). Therefore, automated vulnerability analysis techniques were developed to automatically perform the process of identifying security vulnerabilities in software systems. These tools attempt to democratize the vulnerability analysis process: allowing any developer to identify vulnerabilities in their software automatically, thus finding such vulnerabilities before a malicious hacker.
In this keynote, I will discuss the history of automated vulnerability analysis, from both the binary and the web perspective. Binary fuzzing and black-box web application vulnerability analysis have many aspects in common, yet are often thought of separately. From this, I will discuss the future of automated vulnerability analysis, and how we can achieve the effectiveness of a human vulnerability researcher.

Cited By

View all
  • (2022)From Quantum Fuzzing to the Multiverse: Possible Effective Uses of Quantum NoiseAdvances in Information and Communication10.1007/978-3-030-98012-2_30(399-410)Online publication date: 8-Mar-2022

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SACMAT '19: Proceedings of the 24th ACM Symposium on Access Control Models and Technologies
May 2019
243 pages
ISBN:9781450367530
DOI:10.1145/3322431
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 28 May 2019

Check for updates

Author Tags

  1. automated vulnerability analysis
  2. binary security
  3. fuzzing
  4. vulnerability analysis
  5. web security

Qualifiers

  • Keynote

Funding Sources

Conference

SACMAT '19
Sponsor:

Acceptance Rates

SACMAT '19 Paper Acceptance Rate 12 of 52 submissions, 23%;
Overall Acceptance Rate 177 of 597 submissions, 30%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)71
  • Downloads (Last 6 weeks)10
Reflects downloads up to 18 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2022)From Quantum Fuzzing to the Multiverse: Possible Effective Uses of Quantum NoiseAdvances in Information and Communication10.1007/978-3-030-98012-2_30(399-410)Online publication date: 8-Mar-2022

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media