Targeted Greybox Fuzzing with Static Lookahead Analysis

被引:32
|
作者
Wustholz, Valentin [1 ]
Christakis, Maria [2 ]
机构
[1] ConsenSys Diligence MythX, Berlin, Germany
[2] MPI SWS, Saarbrucken, Germany
来源
2020 ACM/IEEE 42ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2020) | 2020年
关键词
CHECKING; EXECUTION;
D O I
10.1145/3377811.3380388
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Automatic test generation typically aims to generate inputs that explore new paths in the program under test in order to find bugs. Existing work has, therefore, focused on guiding the exploration toward program parts that are more likely to contain bugs by using an offline static analysis. In this paper, we introduce a novel technique for targeted greybox fuzzing using an online static analysis that guides the fuzzer toward a set of target locations, for instance, located in recently modified parts of the program. This is achieved by first semantically analyzing each program path that is explored by an input in the fuzzer's test suite. The results of this analysis are then used to control the fuzzer's specialized power schedule, which determines how often to fuzz inputs from the test suite. We implemented our technique by extending a state-of-the-art, industrial fuzzer for Ethereum smart contracts and evaluate its effectiveness on 27 real-world benchmarks. Using an online analysis is particularly suitable for the domain of smart contracts since it does not require any code instrumentation-adding instrumentation to contracts changes their semantics. Our experiments show that targeted fuzzing significantly outperforms standard greybox fuzzing for reaching 83% of the challenging target locations (up to 14x of median speed-up).
引用
收藏
页码:789 / 800
页数:12
相关论文
共 50 条
  • [31] PosFuzz: augmenting greybox fuzzing with effective position distribution
    Zou, Yanyan
    Zou, Wei
    Zhao, JiaCheng
    Zhong, Nanyu
    Zhang, Yu
    Shi, Ji
    Huo, Wei
    CYBERSECURITY, 2023, 6 (01)
  • [32] Vulnerable Region-Aware Greybox Fuzzing
    Ling-Yun Situ
    Zhi-Qiang Zuo
    Le Guan
    Lin-Zhang Wang
    Xuan-Dong Li
    Jin Shi
    Peng Liu
    Journal of Computer Science and Technology, 2021, 36 : 1212 - 1228
  • [33] Formatted Stateful Greybox Fuzzing of TLS server
    Hu, Fan
    Ji, Jiangan
    Shu, Hui
    Li, Zheming
    Liu, Tieming
    Zhang, Chao
    2024 IEEE CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION, ICST 2024, 2024, : 151 - 160
  • [34] Constraint-guided Directed Greybox Fuzzing
    Lee, Gwangmu
    Shim, Woochul
    Lee, Byoungyoung
    PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 3559 - 3576
  • [35] Greyhound: Directed Greybox Wi-Fi Fuzzing
    Garbelini, Matheus E.
    Wang, Chundong
    Chattopadhyay, Sudipta
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) : 817 - 834
  • [36] PosFuzz: augmenting greybox fuzzing with effective position distribution
    Yanyan Zou
    Wei Zou
    JiaCheng Zhao
    Nanyu Zhong
    Yu Zhang
    Ji Shi
    Wei Huo
    Cybersecurity, 6
  • [37] DDGF: Dynamic Directed Greybox Fuzzing with Path Profiling
    Fang, Haoran
    Zhang, Kaikai
    Yu, Donghui
    Zhang, Yuanyuan
    PROCEEDINGS OF THE 33RD ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2024, 2024, : 832 - 843
  • [38] AFLTurbo: Speed up Path Discovery for Greybox Fuzzing
    Sun, Lei
    Li, Xumei
    Qu, Haipeng
    Zhang, Xiaoshuai
    2020 IEEE 31ST INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE 2020), 2020, : 81 - 91
  • [39] VALL-NUT: Principled Anti-Greybox-Fuzzing
    Li, Yuekang
    Meng, Guozhu
    Xu, Jun
    Zhang, Cen
    Chen, Hongxu
    Xie, Xiaofei
    Wang, Haijun
    Liu, Yang
    2021 IEEE 32ND INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE 2021), 2021, : 288 - 299
  • [40] Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing
    Wang, Jinghan
    Duan, Yue
    Song, Wei
    Yin, Heng
    Song, Chengyu
    PROCEEDINGS OF THE 22ND INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, 2019, : 1 - 15