ALFA-Chains: AI-Supported Discovery of Privilege Escalation and Remote Exploit Chains

📅 2025-04-09
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This work addresses the challenge of automating the discovery of cross-host privilege escalation (PE) and remote exploitation chains in penetration testing—a task traditionally hindered by framework dependency and combinatorial complexity. Methodologically, it introduces a framework-agnostic, AI-driven approach that integrates a CVE knowledge graph with network topology constraints to construct a symbolic vulnerability dependency model; it then applies optimized graph traversal coupled with a lightweight AI inference engine to enable the first global search for multi-hop exploit chains. Evaluated in realistic firewall-constrained environments, the method analyzes a 20-host network in just 0.01 seconds on average, successfully identifying and validating 12 previously unknown feasible exploit chains—including one empirically confirmed via execution. The approach significantly enhances red team operations in efficiency, scalability (supporting networks of 3–200 hosts), and analytical depth, establishing a novel paradigm for automated penetration testing.

Technology Category

Application Category

📝 Abstract
We present ALFA-Chains, a novel method capable of discovering chains of known Privilege Escalation (PE) and Remote exploits in a network. It can assist in penetration-testing without being tied to any specific penetration-testing framework. We test ALFA-Chains' ability to find exploit chains in networks ranging from 3 to 200 hosts. It can discover a chain in a 20 host network in as little as 0.01 seconds. More importantly, it is able to discover 12 novel exploit chains in a realistic firewalled network. We demonstrate the execution of one of these chains, proving ALFA-Chains' capability to improve penetration-testing.
Problem

Research questions and friction points this paper is trying to address.

Discover chains of Privilege Escalation and Remote exploits
Assist penetration-testing without specific framework dependency
Find novel exploit chains in realistic firewalled networks
Innovation

Methods, ideas, or system contributions that make the work stand out.

AI-supported discovery of exploit chains
Framework-independent penetration-testing assistance
Rapid exploit chain detection in networks
🔎 Similar Papers
No similar papers found.
M
Miguel Tulla
MIT, Cambridge, MA
A
Andrea Vignali
University of Naples Federico II, Naples, Italy
C
Christian Colon
MIT, Cambridge, MA
G
Giancarlo Sperlí
University of Naples Federico II, Naples, Italy
S
Simon Pietro Romano
University of Naples Federico II, Naples, Italy
Masataro Asai
Masataro Asai
Research Staff Member, IBM Research, MIT-IBM Watson AI Lab
Artificial IntelligencePlanningSchedulingHeuristic Search
U
Una-May O’Reilly
MIT, Cambridge, MA
Erik Hemberg
Erik Hemberg
Research Scientist, MIT CSAIL
Artificial IntelligenceMachine LearningEvolutionary Computation