Logos: Log Guided Fuzzing for Protocol Implementations

被引:3
|
作者
Wu, Feifan [1 ]
Luo, Zhengxiong [1 ]
Zhao, Yanyang [1 ]
Du, Qingpeng [2 ]
Yu, Junze [1 ]
Peng, Ruikang [3 ]
Shi, Heyuan [3 ]
Jiang, Yu [1 ]
机构
[1] Tsinghua Univ, BNRist, Beijing, Peoples R China
[2] Beijing Univ Posts & Telecommun, Beijing, Peoples R China
[3] Cent South Univ, Changsha, Peoples R China
来源
PROCEEDINGS OF THE 33RD ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2024 | 2024年
关键词
Protocol Fuzzing; Vulnerability Detection;
D O I
10.1145/3650212.3680394
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Network protocols are extensively used in a variety of network devices, making the security of their implementations crucial. Protocol fuzzing has shown promise in uncovering vulnerabilities in these implementations. However traditional methods often require instrumentation of the target implementation to provide guidance, which is intrusive, adds overhead, and can hinder black-box testing. This paper presents Logos, a protocol fuzzer that utilizes nonintrusive runtime log information for fuzzing guidance. Logos first standardizes the unstructured logs and embeds them into a highdimensional vector space for semantic representation. Then, Logos filters the semantic representation and dynamically maintains a semantic coverage to chart the explored space for customized guidance. We evaluate Logos on eight widely used implementations of well-known protocols. Results show that, compared to existing intrusive or expert knowledge-driven protocol fuzzers, Logos achieves 26.75%-106.19% higher branch coverage within 24 hours. Furthermore, Logos exposed 12 security-critical vulnerabilities in these prominent protocol implementations, with 9 CVEs assigned.
引用
收藏
页码:1720 / 1732
页数:13
相关论文
共 11 条
  • [1] ICS Protocol Fuzzing: Coverage Guided Packet Crack and Generation
    Luo, Zhengxiong
    Zuo, Feilong
    Shen, Yuheng
    Jiao, Xun
    Chang, Wanli
    Jiang, Yu
    PROCEEDINGS OF THE 2020 57TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2020,
  • [2] Fuzzing an Industrial Proprietary Protocol
    Baranov, Eduard
    Legay, Axel
    Vivian, Martin
    FORMAL METHODS FOR INDUSTRIAL CRITICAL SYSTEMS, FMICS 2024, 2024, 14952 : 119 - 135
  • [3] Protocol fuzzing to find security vulnerabilities of RabbitMQ
    Kwon, Soonhong
    Son, Sang-Jin
    Choi, Yangseo
    Lee, Jong-Hyouk
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (23):
  • [4] AutoFuzz: Automated Network Protocol Fuzzing Framework
    Gorbunov, Serge
    Rosenbloom, Arnold
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (08): : 239 - 245
  • [5] REFuzz: A Remedy for Saturation in Coverage-Guided Fuzzing
    Lyu, Qian
    Zhang, Dalin
    Da, Rihan
    Zhang, Hailong
    ELECTRONICS, 2021, 10 (16)
  • [6] Tardis: Coverage-Guided Embedded Operating System Fuzzing
    Shen, Yuheng
    Xu, Yiru
    Sun, Hao
    Liu, Jianzhong
    Xu, Zichen
    Cui, Aiguo
    Shi, Heyuan
    Jiang, Yu
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 41 (11) : 4563 - 4574
  • [7] Security Testing of Session Initiation Protocol Implementations
    Harris, Ian G.
    Alrahem, Thoulfekar
    Chen, Alex
    DiGiuseppe, Nick
    Gee, Jefferey
    Hsiao, Shang-Pin
    Mattox, Sean
    Park, Taejoon
    Selvaraj, Saravanan
    Tam, Albert
    Carlsson, Marcel
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 1 (02): : 91 - 103
  • [8] Fuzzing method based on field filter and packet repair for GTPv2 protocol
    Wang, Guobin
    Zhao, Jingling
    Cui, Baojiang
    INTERNET OF THINGS, 2019, 8
  • [9] Battling against Protocol Fuzzing: Protecting Networked Embedded Devices from Dynamic Fuzzers
    Liu, Puzhuo
    Zheng, Yaowen
    Sun, Chengnian
    Li, Hong
    Li, Zhi
    Sun, Limin
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2024, 33 (04)
  • [10] Alphuzz: Monte Carlo Search on Seed-Mutation Tree for Coverage-Guided Fuzzing
    Zhao, Yiru
    Wang, Xiaoke
    Zhao, Lei
    Cheng, Yueqiang
    Yin, Heng
    PROCEEDINGS OF THE 38TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2022, 2022, : 534 - 547