Sequence Directed Hybrid Fuzzing

被引:0
|
作者
Liang, Hongliang [1 ]
Jiang, Lin [1 ]
Ai, Lu [1 ]
Wei, Jinyi [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Comp Sci, Beijing, Peoples R China
来源
PROCEEDINGS OF THE 2020 IEEE 27TH INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION, AND REENGINEERING (SANER '20) | 2020年
关键词
sequence guidance; concolic execution; crash reproduction; true positive verification; vulnerability detection;
D O I
10.1109/saner48275.2020.9054807
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Existing directed grey-box fuzzers are effective compared with coverage-based fuzzers. However, they fail to achieve a balance between effectiveness and efficiency, and it is difficult to cover complex paths due to random mutation. To mitigate the issue, we propose a novel approach, sequence directed hybrid fuzzing (SDHF), which leverages a sequence-directed strategy and concolic execution technique to enhance the effectiveness of fuzzing. Given a set of target statement sequences of a program, SDHF aims to generate inputs that can reach the statements in each sequence in order and trigger potential bugs in the program. We implement the proposed approach in a tool called Berry and evaluate its capability on crash reproduction, true positive verification, and vulnerability detection. Experimental results demonstrate that Berry outperforms four state-of-the-art fuzzers, including directed fuzzers BugRedux, AFLGo and Lolly, and undirected hybrid fuzzer QSYM. Moreover, Berry found 7 new vulnerabilities in real-world programs such as UPX and GNU Libextractor, and 3 new CVEs were assigned.
引用
收藏
页码:127 / 137
页数:11
相关论文
共 50 条
  • [31] FUZZOLIC: Mixing fuzzing and concolic execution
    Borzacchiello, Luca
    Coppa, Emilio
    Demetrescu, Camil
    COMPUTERS & SECURITY, 2021, 108
  • [32] Dr.PathFinder: hybrid fuzzing with deep reinforcement concolic execution toward deeper path-first search
    Jeon, Seungho
    Moon, Jongsub
    NEURAL COMPUTING & APPLICATIONS, 2022, 34 (13): : 10731 - 10750
  • [33] LearnAFL: Greybox Fuzzing With Knowledge Enhancement
    Yue, Tai
    Tang, Yong
    Yu, Bo
    Wang, Pengfei
    Wang, Enze
    IEEE ACCESS, 2019, 7 : 117029 - 117043
  • [34] QFuzz: Quantitative Fuzzing for Side Channels
    Noller, Yannic
    Tizpaz-Niari, Saeid
    ISSTA '21: PROCEEDINGS OF THE 30TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, 2021, : 257 - 269
  • [35] Protection of Systems Against Fuzzing Attacks
    Ouairy, Leopold
    Le-Bouder, Helene
    Lanet, Jean-Louis
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2018, 2019, 11358 : 156 - 172
  • [36] Fuzzing Methods Recommendation Based on Feature Vectors
    Zhang, Chi
    Chen, Jinfu
    2021 36TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING ASE 2021, 2021, : 1079 - 1081
  • [37] A Smart Fuzzing Approach for Integer Overflow Detection
    Cai, Jun
    Zou, Peng
    He, Jun
    Ma, Jinxin
    INFORMATION TECHNOLOGY IN INDUSTRY, 2014, 2 (03): : 98 - 103
  • [38] Logos: Log Guided Fuzzing for Protocol Implementations
    Wu, Feifan
    Luo, Zhengxiong
    Zhao, Yanyang
    Du, Qingpeng
    Yu, Junze
    Peng, Ruikang
    Shi, Heyuan
    Jiang, Yu
    PROCEEDINGS OF THE 33RD ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2024, 2024, : 1720 - 1732
  • [39] Efficient seed generation method for software fuzzing
    Liu Z.
    Zhang H.
    Liu Y.
    Yang L.
    Wang M.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2024, 51 (02): : 126 - 136
  • [40] Vulnerable Region-Aware Greybox Fuzzing
    Situ, Ling-Yun
    Zuo, Zhi-Qiang
    Guan, Le
    Wang, Lin-Zhang
    Li, Xuan-Dong
    Shi, Jin
    Liu, Peng
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2021, 36 (05) : 1212 - 1228