US 12,437,082 B2
System and method for automated exploitation generation
Leander A. Metcalf, II, Millersville, MD (US); and Allen Stewart, Atlanta, GA (US)
Assigned to BOOZ ALLEN HAMILTON INC., McLean, VA (US)
Filed by Booz Allen Hamilton Inc., McLean, VA (US)
Filed on Jul. 31, 2024, as Appl. No. 18/790,022.
Claims priority of provisional application 63/516,661, filed on Jul. 31, 2023.
Prior Publication US 2025/0045418 A1, Feb. 6, 2025
Int. Cl. G06F 21/57 (2013.01)
CPC G06F 21/577 (2013.01) [G06F 2221/034 (2013.01)] 16 Claims
OG exemplary drawing
 
1. A system for automated exploit generation, the system comprising:
a processor; and
a memory associated with the processor having instructions stored thereon that when executed will cause the processor to:
receive input data representative of a target action to establish a target having a potential target vulnerability;
build a simulated or emulated target environment that includes the established target;
conduct an analysis method including one or more of a static, a concrete, a dynamic, or a symbolic analysis of one or more exploitation techniques, the analysis method configured to generate one or more artifacts including one or more behavioral signatures of exploit primitives that translate across different and disparate exploitation techniques;
create a chainable sequence including the one or more artifacts and one or more of an information disclosure, a read, a write, or an execution exploit primitive;
generate an exploit chain that, when executed by the processor in response to the target action, will transform the target action to a target failure within the simulated or emulated target environment and thereby expose the target vulnerability, the exploit chain including the chainable sequence;
execute the exploit chain within the simulated or emulated target environment to examine coverage of the exposed target vulnerability; and
generate an output representative of the exposed target vulnerability.