Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation

Xinyi Wang,Cen Zhang,Yeting Li,Zhiwu Xu, Shuailin Huang,Yi Liu, Yican Yao,Yang Xiao,Yanyan Zou,Yang Liu,Wei Huo

2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP(2023)

Cited 0|Views32
No score
Abstract
Regular expression Denial-of-Service (ReDoS) is one kind of algorithmic complexity attack. For a vulnerable regex, attackers can craft certain strings to trigger the super-linear worst-case matching time, which causes denial-of-service to regex engines. Various ReDoS detection approaches have been proposed recently. Among them, hybrid approaches which absorb the advantages of both static and dynamic approaches have shown their performance superiority. However, two key challenges still hinder the effectiveness of the detection: 1) Existing modelings summarize localized vulnerability patterns based on partial features of the vulnerable regex; 2) Existing attack string generation strategies are ineffective since they neglected the fact that non-vulnerable parts of the regex may unexpectedly invalidate the attack string (we name this kind of invalidation as disturbance.) RENGAR is our hybrid ReDoS detector with new vulnerability modeling and disturbance free attack string generator. It has the following key features: 1) Benefited by summarizing patterns from full features of the vulnerable regex, its modeling is a more precise interpretation of the root cause of ReDoS vulnerability. The modeling is more descriptive and precise than the union of existing modelings while keeping conciseness; 2) For each vulnerable regex, its generator automatically checks all potential disturbances and composes generation constraints to avoid possible disturbances. Compared with nine state-of-the-art tools, RENGAR detects not only all vulnerable regexes they found but also 3 - 197 times more vulnerable regexes. Besides, it saves 57.41% - 99.83% average detection time compared with tools containing a dynamic validation process. Using RENGAR, we have identified 69 zero-day vulnerabilities (21 CVEs) affecting popular projects which have more than dozens of millions weekly download count.
More
Translated text
Key words
algorithmic complexity attack,disturbance free attack string generator,exploit generation,nonvulnerable parts,principled vulnerability modeling,ReDoS detection approaches,ReDoS vulnerability,regular expression denial-of-service,vulnerability patterns,vulnerable regex,zero-day vulnerabilities
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined