CollAFL: Path Sensitive Fuzzing

被引:294
作者
Gan, Shuitao [1 ]
Zhang, Chao [2 ]
Qin, Xiaojun [1 ]
Tu, Xuwen [1 ]
Li, Kang [3 ]
Pei, Zhongyu [2 ]
Chen, Zuoning [4 ]
机构
[1] State Key Lab Math Engn & Adv Comp, Zhengzhou, Henan, Peoples R China
[2] Tsinghua Univ, Inst Network Sci & Cyberspace, Beijing, Peoples R China
[3] Cyber Immun Lab, Scottsdale, AZ USA
[4] Natl Res Ctr Parallel Comp Engn & Technol, Beijing, Peoples R China
来源
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) | 2018年
基金
中国国家自然科学基金;
关键词
D O I
10.1109/SP.2018.00040
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Coverage-guided fuzzing is a widely used and effective solution to find software vulnerabilities. Tracking code coverage and utilizing it to guide fuzzing are crucial to coverage-guided fuzzers. However, tracking full and accurate path coverage is infeasible in practice due to the high instrumentation overhead. Popular fuzzers (e.g., AFL) often use coarse coverage information, e.g., edge hit counts stored in a compact bitmap, to achieve highly efficient greybox testing. Such inaccuracy and incompleteness in coverage introduce serious limitations to fuzzers. First, it causes path collisions, which prevent fuzzers from discovering potential paths that lead to new crashes. More importantly, it prevents fuzzers from making wise decisions on fuzzing strategies. In this paper, we propose a coverage sensitive fuzzing solution CollAFL. It mitigates path collisions by providing more accurate coverage information, while still preserving low instrumentation overhead. It also utilizes the coverage information to apply three new fuzzing strategies, promoting the speed of discovering new paths and vulnerabilities. We implemented a prototype of CollAFL based on the popular fuzzer AFL and evaluated it on 24 popular applications. The results showed that path collisions are common, i.e., up to 75% of edges could collide with others in some applications, and CollAFL could reduce the edge collision ratio to nearly zero. Moreover, armed with the three fuzzing strategies, CollAFL outperforms AFL in terms of both code coverage and vulnerability discovery. On average, CollAFL covered 20% more program paths, found 320% more unique crashes and 260% more bugs than AFL in 200 hours. In total, CollAFL found 157 new security bugs with 95 new CVEs assigned.
引用
收藏
页码:679 / 696
页数:18
相关论文
共 37 条
  • [1] [Anonymous], 2017, P NETWORK DISTRIBUTE
  • [2] [Anonymous], 2017, CORR
  • [3] [Anonymous], 2017, CoRR
  • [4] [Anonymous], 2013, NEW FEATURES ADDRESS
  • [5] [Anonymous], 2012, Tech. Rep.
  • [6] Bhme M., 2016, P 2016 ACM SIGSAC C, P1032, DOI DOI 10.1145/2976749.2978428
  • [7] Biswas P., 2017, VENERABLE VARIADIC V
  • [8] Bohme M., 2017, CCS
  • [9] Checkoway S., 2010, C COMP COMM SEC
  • [10] Corina J., 2017, C COMP COMM SEC