IMF: Inferred Model-based Fuzzer

被引:88
作者
Han, HyungSeok [1 ]
Cha, Sang Kil [1 ]
机构
[1] Korea Adv Inst Sci & Technol, Daejeon, South Korea
来源
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2017年
关键词
fuzzing; kernel vulnerabilities; model-based fuzzing; API fuzzing;
D O I
10.1145/3133956.3134103
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Kernel vulnerabilities are critical in security because they naturally allow attackers to gain unprivileged root access. Although there has been much research on finding kernel vulnerabilities from source code, there are relatively few research on kernel fuzzing, which is a practical bug finding technique that does not require any source code. Existing kernel fuzzing techniques involve feeding in random input values to kernel API functions. However, such a simple approach does not reveal latent bugs deep in the kernel code, because many API functions are dependent on each other, and they can quickly reject arbitrary parameter values based on their calling context. In this paper, we propose a novel fuzzing technique for commodity OS kernels that leverages inferred dependence model between API function calls to discover deep kernel bugs. We implement our technique on a fuzzing system, called IMF. IMF has already found 32 previously unknown kernel vulnerabilities on the latest macOS version 10.12.3 (16D32) at the time of this writing.
引用
收藏
页码:2345 / 2358
页数:14
相关论文
共 62 条
[1]  
[Anonymous], KERN FUZZ
[2]  
[Anonymous], 2016, NEUR FUZZ
[3]  
[Anonymous], 2016, TRIF LIN SYSC FUZZ
[4]  
[Anonymous], BLACK HAT EU
[5]  
[Anonymous], 2013, P NETW DISTR SYST SE
[6]  
[Anonymous], 2010, TRINITY
[7]  
[Anonymous], Compilers: Principles, Techniques
[8]  
[Anonymous], PWN4FUN SPRING 201 2
[9]  
[Anonymous], LINUX KERNEL DEV
[10]  
[Anonymous], KERN ARCH OV