StFuzzer: Contribution-Aware Coverage-Guided Fuzzing for Smart Devices

被引:2
作者
Yang, Jiageng [1 ]
Zhang, Xinguo [1 ]
Lu, Hui [1 ]
Shafiq, Muhammad [1 ]
Tian, Zhihong [1 ]
机构
[1] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou, Peoples R China
基金
中国国家自然科学基金;
关键词
Application programs - Codes (symbols);
D O I
10.1155/2021/1987844
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The root cause of the insecurity for smart devices is the potential vulnerabilities in smart devices. There are many approaches to find the potential bugs in smart devices. Fuzzing is the most effective vulnerability finding technique, especially the coverage-guided fuzzing. The coverage-guided fuzzing identifies the high-quality seeds according to the corresponding code coverage triggered by these seeds. Existing coverage-guided fuzzers consider that the higher the code coverage of seeds, the greater the probability of triggering potential bugs. However, in real-world applications running on smart devices or the operation system of the smart device, the logic of these programs is very complex. Basic blocks of these programs play a different role in the process of application exploration. This observation is ignored by existing seed selection strategies, which reduces the efficiency of bug discovery on smart devices. In this paper, we propose a contribution-aware coverage-guided fuzzing, which estimates the contributions of basic blocks for the process of smart device exploration. According to the control flow of the target on any smart device and the runtime information during the fuzzing process, we propose the static contribution of a basic block and the dynamic contribution built on the execution frequency of each block. The contribution-aware optimization approach does not require any prior knowledge of the target device, which ensures our optimization adapting gray-box fuzzing and white-box fuzzing. We designed and implemented a contribution-aware coverage-guided fuzzer for smart devices, called StFuzzer. We evaluated StFuzzer on four real-world applications that are often applied on smart devices to demonstrate the efficiency of our contribution-aware optimization. The result of our trials shows that the contribution-aware approach significantly improves the capability of bug discovery and obtains better execution speed than state-of-the-art fuzzers.
引用
收藏
页数:15
相关论文
共 35 条
[1]  
Aflpin O., 2018, GITHUB
[2]   Coverage-Based Greybox Fuzzing as Markov Chain [J].
Bohme, Marcel ;
Van-Thuan Pham ;
Roychoudhury, Abhik .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2019, 45 (05) :489-506
[3]   Directed Greybox Fuzzing [J].
Bohme, Marcel ;
Van-Thuan Pham ;
Manh-Dung Nguyen ;
Roychoudhury, Abhik .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :2329-2344
[4]   Hawkeye: Towards a Desired Directed Grey-box Fuzzer [J].
Chen, Hongxu ;
Xue, Yinxing ;
Li, Yuekang ;
Chen, Bihuan ;
Xie, Xiaofei ;
Wu, Xiuheng ;
Liu, Yang .
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, :2095-2108
[5]   Angora: Efficient Fuzzing by Principled Search [J].
Chen, Peng ;
Chen, Hao .
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, :711-725
[6]   SAVIOR: Towards Bug-Driven Hybrid Testing [J].
Chen, Yaohui ;
Li, Peng ;
Xu, Jun ;
Guo, Shengjian ;
Zhou, Rundong ;
Zhang, Yulong ;
Wei, Tao ;
Lu, Long .
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, :1580-1596
[7]  
Eddington M, 2011, Peach Fuzzer, V34
[8]  
Gan ST, 2020, PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, P2577
[9]   CollAFL: Path Sensitive Fuzzing [J].
Gan, Shuitao ;
Zhang, Chao ;
Qin, Xiaojun ;
Tu, Xuwen ;
Li, Kang ;
Pei, Zhongyu ;
Chen, Zuoning .
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, :679-696
[10]  
Godefroid P, 2017, IEEE INT CONF AUTOM, P50, DOI 10.1109/ASE.2017.8115618