SHFuzz: Service handler-aware fuzzing for detecting multi-type vulnerabilities in embedded devices

被引:0
|
作者
Li, Xixing [1 ]
Zhao, Lei [2 ,3 ]
Wei, Qiang [1 ]
Wu, Zehui [1 ]
Shi, Weiming [4 ]
Wang, Yunchao [1 ]
机构
[1] Natl Digital Switching Syst Engn & Technol Res Ctr, Zhengzhou, Peoples R China
[2] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan, Peoples R China
[3] Minist Educ, Key Lab Aerosp Informat Secur & Trusted Comp, Wuhan, Peoples R China
[4] Chaitin Secur Res Lab, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Fuzzing; Embedded devices; Vulnerabilities;
D O I
10.1016/j.cose.2023.103618
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Embedded devices in IoT are of great convenience to our daily lives and industries, but they also introduce multi-type vulnerabilities. Most vulnerabilities reside in various handlers of service program. However, existing fuzzing methods existing fuzzing methods can neither efficiently nor effectively to discover these vulnerabilities: they can not extract the service handler alone and properly pool resources for testing them. In this study, we propose a novel service handlers aware fuzzing method to efficiently discover multi-type vulnerabilities in embedded devices. Our key observation is that service program dispatches the service handlers (the code snippet which implements the desired work of user request) in two general ways. Meanwhile, multi type vulnerabilities usually happen at sensitive APIs during the execution of service handler. So in our method, we first design a static analysis method to extract the info of service handlers and sensitive APIs. Then during fuzzing, the service handler coverage strategy guides the fuzzer to cover more service handlers; after the sensitive APIs are reached, the sensitive APIs exploitation strategy is proposed to strengthen the ability and efficiency of discovering vulnerabilities. Based on our method, we implement a prototype system, named SHFuzz. Experiments on 19 target programs from popular brand devices show that, SHFuzz outperforms the state-of-art tool FIRM-AFL in the coverage of sensitive APIs, the diversity of detected vulnerabilities and efficiency. Furthermore, SHFuzz discovers 16 zero-day vulnerabilities and reports them to vendors.
引用
收藏
页数:15
相关论文
共 4 条
  • [1] ESRFuzzer: an enhanced fuzzing framework for physical SOHO router devices to discover multi-Type vulnerabilities
    Yu Zhang
    Wei Huo
    Kunpeng Jian
    Ji Shi
    Longquan Liu
    Yanyan Zou
    Chao Zhang
    Baoxu Liu
    Cybersecurity, 4
  • [2] ESRFuzzer: an enhanced fuzzing framework for physical SOHO router devices to discover multi-Type vulnerabilities
    Zhang, Yu
    Huo, Wei
    Jian, Kunpeng
    Shi, Ji
    Liu, Longquan
    Zou, Yanyan
    Zhang, Chao
    Liu, Baoxu
    CYBERSECURITY, 2021, 4 (01)
  • [3] SRFuzzer: An Automatic Fuzzing Framework for Physical SOHO Router Devices to Discover Multi-Type Vulnerabilities
    Zhang, Yu
    Huo, Wei
    Jian, Kunpeng
    Shi, Ji
    Lu, Haoliang
    Liu, Longquan
    Wang, Chen
    Sun, Dandan
    Zhang, Chao
    Liu, Baoxu
    35TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSA), 2019, : 544 - 556
  • [4] QoS-Aware Uplink NOMA with Multi-Type Service Coexistence for LEO Satellite Constellation
    Hu, Qifan
    Jiao, Jian
    Wu, Shaohua
    Lu, Rongxing
    Zhang, Qinyu
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 3924 - 3929