A Large-scale Parallel Fuzzing System

被引:2
作者
Li, Yang [1 ]
Feng, Chao [1 ]
Tang, Chaojing [1 ]
机构
[1] Natl Univ Def Technol, Sch Elect Sci, Changsha 410073, Peoples R China
来源
ICAIP 2018: 2018 THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN IMAGE PROCESSING | 2018年
关键词
Vulnerability discovery; Parallel fuzzing; Test case generation; Distributed computing;
D O I
10.1145/3239576.3239615
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The application of parallelization to fuzzing can effectively improve test efficiency. But with the expansion of node scale, synchronization mechanism will become the bottleneck. To solve this problem, this paper presents a method which is suitable for large-scale parallelization to generate test cases. It simplifies the execution path of tree form into a one-dimensional array by preprocessing, which ensures validity and reduces processing time. This paper also designs and implements a parallel fuzzing system using this method. The system uses a polling mechanism to reduce repetitive tasks. A jump-oriented strategy is adopted to reduce redundancy when filtering crashes. At the end of this paper, the effectiveness of the system in improving the efficiency of fuzzing is further demonstrated through experiments.
引用
收藏
页码:194 / 197
页数:4
相关论文
共 11 条
[1]   Taint-based Directed Whitebox Fuzzing [J].
Ganesh, Vijay ;
Leek, Tim ;
Rinard, Martin .
2009 31ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, PROCEEDINGS, 2009, :474-+
[2]  
Godefroid P., 2009, DART DIRECTED AUTOMA
[3]   Software Crash Analysis for Automatic Exploit Generation on Binary Programs [J].
Huang, Shih-Kun ;
Huang, Min-Hsiang ;
Huang, Po-Yen ;
Lu, Han-Lin ;
Lai, Chung-Wei .
IEEE TRANSACTIONS ON RELIABILITY, 2014, 63 (01) :270-289
[4]   Efficient file fuzz testing using automated analysis of binary file format [J].
Kim, Hyoung Chun ;
Choi, Young Han ;
Lee, Dong Hoon .
JOURNAL OF SYSTEMS ARCHITECTURE, 2011, 57 (03) :259-268
[5]  
Miller B P, 2006, P INT WORKSH RAND TE, V41, P78
[6]  
Molnar D. A., 2009, DYNAMIC TEST GENERAT
[7]  
Sutton M, 2007, Fuzzing: Brute Force Vulnerability Discovery
[8]  
Takanen Ari, 2008, Fuzzing for Software Security, V1st
[9]  
Wu B., 2014, APPL MECH MAT, P571
[10]  
WU B, 2014, APPL MECH MAT, P536