Fuzz Testing Process Visualization

被引:0
|
作者
Lu, Han-Lin [1 ]
Zhuang, Ren-Jie [1 ]
Huang, Shih-Kun [1 ,2 ]
机构
[1] Natl Yang Ming Chiao Tung Univ, Dept Comp Sci, Hsinchu 300, Taiwan
[2] Natl Yang Ming Chiao Tung Univ, Informat Technol Serv Ctr, Hsinchu 300, Taiwan
关键词
big data; knowledge management; knowledge creation; knowledge application; technology; Cynefin framework;
D O I
10.6688/JISE.202309_39(5).0003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The conventional fuzz testing process consists of an input mutation, an execution to test the program, monitoring, and information collection to discover bugs and security vulnerabilities. However, practical programs have more features and complex logic, and legacy mutation strategies cannot reach a deeper path to find potential bugs. A solution to this problem is to analyze the input seeds and employ test harnesses for the testing flows. This study proposes an interactive visualization tool called FuzzInspector for fuzz testing. We implemented a visualizer mode on AFL++ to generate test data for a binary analysis tool (Qiling framework and Radare2). We then visualized the controlflow graph and execution path information. This method does not require the source code and reduces the performance overhead. We also implemented an interactive user interface for the user to set the breakpoint, seed, register, and memory address and send the request to the Qiling framework for dynamic analysis. Moreover, the seed constraint can assist the fuzzer in generating a formatted seed for exploring a specific execution path. We evaluated the search time using a known approach to common vulnerabilities and exposures (CVE) and found that the search for bugs with constraints is 15 to 20 times faster than that without constraints. Moreover, we introduced a dynamic analysis feature to find controllable data and assist the exploit development process.
引用
收藏
页码:1037 / 1059
页数:23
相关论文
共 50 条
  • [1] Fuzz Testing Virtual ECUs as Part of the Continuous Security Testing Process
    Oka D.K.
    SAE International Journal of Transportation Cybersecurity and Privacy, 2020, 2 (02): : 159 - 168
  • [2] Evaluating Fuzz Testing
    Klees, George
    Ruef, Andrew
    Cooper, Benji
    Wei, Shiyi
    Hicks, Michael
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2123 - 2138
  • [3] Fuzz testing for software assurance
    Vadim, Okun
    Fong, Elizabeth
    CrossTalk, 2015, 28 (02): : 35 - 37
  • [4] On the Effectiveness of Scheduling Fuzz Testing
    Chen, Wei-Jun
    Tyan, Hsiao-Rong
    Huang, Shih-Kun
    INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 841 - 849
  • [5] Web Application Fuzz Testing
    Andrianto, Ivan
    Liem, M. M. Inggriani
    Asnar, Yudistira Dwi Wardhana
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON DATA AND SOFTWARE ENGINEERING (ICODSE), 2017,
  • [6] Paul Butcher on Fuzz Testing
    Winston, Philip
    IEEE SOFTWARE, 2022, 39 (01) : 118 - 120
  • [7] EBLT - Blueprints testing library using fuzz testing
    Paduraru, Ciprian
    Cristea, Rares
    Stefanescu, Alin
    SOFTWARE IMPACTS, 2024, 21
  • [8] Fuzz Testing based on Sulley Framework
    Guo, Zhong
    Li, Nan
    CURRENT TRENDS IN COMPUTER SCIENCE AND MECHANICAL AUTOMATION, VOL 1, 2017, : 181 - 187
  • [9] Fuzz Testing for Rust Library Functions
    Guo, Yongjian
    Xiao, Xi
    Lin, Yuanyi
    Li, Hao
    Wu, Xiangbo
    Zhou, Tao
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 990 - 997
  • [10] Fuzz Testing Based on Virtualization Technology
    Zhou, Longbin
    Li, Zhoujun
    PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON COMPUTING AND ARTIFICIAL INTELLIGENCE (ICCAI 2018), 2018, : 57 - 61