Formatted Stateful Greybox Fuzzing of TLS server

被引:0
作者
Hu, Fan [1 ]
Ji, Jiangan [1 ]
Shu, Hui [1 ]
Li, Zheming [2 ]
Liu, Tieming [1 ]
Zhang, Chao [2 ]
机构
[1] Minist Educ, Key Lab Cyberspace Secur, Xian, Shaanxi, Peoples R China
[2] Tsinghua Univ, Beijing, Peoples R China
来源
2024 IEEE CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION, ICST 2024 | 2024年
关键词
protocol testing; stateful fuzzing; formatted mutation; TLS protocol; FUZZER;
D O I
10.1109/ICST60714.2024.00022
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The TLS protocol is one of the most crucial foundations for ensuring internet security. Consequently, vulnerabilities within the TLS protocol have a significant impact on the Internet security. This paper aims to explore more efficient methods of discovering vulnerabilities in the TLS protocol. Fuzzing stands out as one of the most important techniques for vulnerability discovery in the TLS protocol. To tackle the high complexity of the TLS protocol, stateful greybox fuzzers such as AFLnet have been introduced to enable stateful fuzzing of TLS servers. However, these mutation-based fuzzers often encounter challenges in preserving the message format information during the mutation process, which can undermine the testing results. As a result, this paper proposes a novel approach that incorporates a formatted mutation strategy into the stateful greybox fuzzing process, with the aim of achieving more efficient mutation results. The evaluation process involves four mainstream fuzzers, with OpenSSL's TLS server serving as the target. The results demonstrate that the proposed method significantly enhances the quality of generated seeds, code coverage, and state coverage across all four fuzzers.
引用
收藏
页码:151 / 160
页数:10
相关论文
共 30 条
  • [1] SnapFuzz: High-Throughput Fuzzing of Network Applications
    Andronidis, Anastasios
    Cadar, Cristian
    [J]. PROCEEDINGS OF THE 31ST ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2022, 2022, : 340 - 351
  • [2] [Anonymous], 2020, The heartbleed bug
  • [3] [Anonymous], 2021, libFuzzer-a library for coverage-guided fuzz testing
  • [4] Ba JS, 2022, Arxiv, DOI arXiv:2204.02545
  • [5] Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations
    Brubaker, Chad
    Jana, Suman
    Ray, Baishakhi
    Khurshid, Sarfraz
    Shmatikov, Vitaly
    [J]. 2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, : 114 - 129
  • [6] Guided Differential Testing of Certificate Validation in SSL/TLS Implementations
    Chen, Yuting
    Su, Zhendong
    [J]. 2015 10TH JOINT MEETING OF THE EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND THE ACM SIGSOFT SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE 2015) PROCEEDINGS, 2015, : 793 - 804
  • [7] de Ruiter J, 2015, PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, P193
  • [8] GrayC: Greybox Fuzzing of Compilers and Analysers for C
    Even-Mendoza, Karine
    Sharma, Arindam
    Donaldson, Alastair F.
    Cadar, Cristian
    [J]. PROCEEDINGS OF THE 32ND ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2023, 2023, : 1219 - 1231
  • [9] DTLS-Fuzzer: A DTLS Protocol State Fuzzer
    Fiterau-Brostean, Paul
    Jonsson, Bengt
    Sagonas, Konstantinos
    Taquist, Fredrik
    [J]. 2022 IEEE 15TH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION (ICST 2022), 2022, : 456 - 458
  • [10] Making No-Fuss Compiler Fuzzing Effective
    Groce, Alex
    van Tonder, Rijnard
    Kalburgi, Goutamkumar Tulajappa
    Le Goues, Claire
    [J]. CC'22: PROCEEDINGS OF THE 31ST ACM SIGPLAN INTERNATIONAL CONFERENCE ON COMPILER CONSTRUCTION, 2022, : 194 - 204