POWER: Program Option-Aware Fuzzer for High Bug Detection Ability

被引:10
作者
Lee, Ahcheong [1 ]
Ariq, Irfan [1 ]
Kim, Yunho [2 ]
Kim, Moonzoo [3 ]
机构
[1] Korea Adv Inst Sci & Technol, Sch Comp, Daejeon, South Korea
[2] Hanyang Univ, Dept Comp Sci, Seoul, South Korea
[3] Korea Adv Inst Sci & Technol, Sch Comp, VPlusLab Inc, Daejeon, South Korea
来源
2022 IEEE 15TH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION (ICST 2022) | 2022年
关键词
Automated test generation; fuzzing; program option configurations; dynamic function relevance; crash hug detection; dynamic analysis;
D O I
10.1109/ICST53961.2022.00032
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Most programs with command-line interface (CLI) have dozens of command-line options (e.g., -1, -F, -R for 1s) to alternate the operation of the programs. Thus, depending on the option configurations (i.e., a list of options like -1 -F and -F -R) applied during fuzzing, the lest coverage and crash detection results can vary significantly. In this paper, we propose a novel fuzzing technique POWER that detects more crashes than the cutting-edge fuzzers by actively constructing and carefully selecting various program option configurations. The salient idea of POWER is to enforce diverse executions of a target program by selecting a set of the option configurations each of which is far "different/distant" from the others in the set. Another core idea of POWER is to apply different fuzzing strategies to different input domains (i.e., option configurations and input Ides) to increase testing effectiveness within limited time budget. The experiment results on the 30 real-world programs show that POWER detects significantly more crash bugs than the state-of-the-art fuzzing techniques.
引用
收藏
页码:220 / 231
页数:12
相关论文
共 55 条
[31]   FAIRFuzz: A Targeted Mutation Strategy for Increasing Greybox Fuzz Testing Coverage [J].
Lemieux, Caroline ;
Sen, Koushik .
PROCEEDINGS OF THE 2018 33RD IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMTED SOFTWARE ENGINEERING (ASE' 18), 2018, :475-485
[32]   OBJECT-ORIENTED METRICS THAT PREDICT MAINTAINABILITY [J].
LI, W ;
HENRY, S .
JOURNAL OF SYSTEMS AND SOFTWARE, 1993, 23 (02) :111-122
[33]   OTA: An Operation-oriented Time Allocation Strategy for Greybox Fuzzing [J].
Li, Xumei ;
Sun, Lei ;
Jiang, Ruobing ;
Qu, Haipeng ;
Yan, Zhen .
2021 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION AND REENGINEERING (SANER 2021), 2021, :108-118
[34]  
Li Y, 2020, "UNIFUZZ: A holistic and pragmatic metrics-driven platform for evaluating fuzzers
[35]   CEREBRO: Context-Aware Adaptive Fuzzing for Effective Vulnerability Detection [J].
Li, Yuekang ;
Xue, Yinxing ;
Chen, Hongxu ;
Wu, Xiuheng ;
Zhang, Cen ;
Xie, Xiaofei ;
Wang, Haijun ;
Liu, Yang .
ESEC/FSE'2019: PROCEEDINGS OF THE 2019 27TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, 2019, :533-544
[36]  
Lyu CY, 2019, PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, P1949
[37]   On strategies for testing software product lines: A systematic literature review [J].
Machado, Ivan do Carmo ;
McGregor, John D. ;
Cavalcanti, Yguarata Cerqueira ;
de Almeida, Eduardo Santana .
INFORMATION AND SOFTWARE TECHNOLOGY, 2014, 56 (10) :1183-1199
[38]   Ankou: Guiding Grey-box Fuzzing towards Combinatorial Difference [J].
Manes, Valentin J. M. ;
Kim, Soomin ;
Cha, Sang Kil .
2020 ACM/IEEE 42ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2020), 2020, :1024-1036
[39]   The Art, Science, and Engineering of Fuzzing: A Survey [J].
Manes, Valentin J. M. ;
Han, HyungSeok ;
Han, Choongwoo ;
Cha, Sang Kil ;
Egele, Manuel ;
Schwartz, Edward J. ;
Woo, Maverick .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2021, 47 (11) :2312-2331
[40]  
Metzman Jonathan, 2020, FuzzBench: Fuzzer Benchmarking as a Service