StFuzzer: Contribution-Aware Coverage-Guided Fuzzing for Smart Devices

被引:2
|
作者
Yang, Jiageng [1 ]
Zhang, Xinguo [1 ]
Lu, Hui [1 ]
Shafiq, Muhammad [1 ]
Tian, Zhihong [1 ]
机构
[1] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou, Peoples R China
基金
中国国家自然科学基金;
关键词
35;
D O I
10.1155/2021/1987844
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The root cause of the insecurity for smart devices is the potential vulnerabilities in smart devices. There are many approaches to find the potential bugs in smart devices. Fuzzing is the most effective vulnerability finding technique, especially the coverage-guided fuzzing. The coverage-guided fuzzing identifies the high-quality seeds according to the corresponding code coverage triggered by these seeds. Existing coverage-guided fuzzers consider that the higher the code coverage of seeds, the greater the probability of triggering potential bugs. However, in real-world applications running on smart devices or the operation system of the smart device, the logic of these programs is very complex. Basic blocks of these programs play a different role in the process of application exploration. This observation is ignored by existing seed selection strategies, which reduces the efficiency of bug discovery on smart devices. In this paper, we propose a contribution-aware coverage-guided fuzzing, which estimates the contributions of basic blocks for the process of smart device exploration. According to the control flow of the target on any smart device and the runtime information during the fuzzing process, we propose the static contribution of a basic block and the dynamic contribution built on the execution frequency of each block. The contribution-aware optimization approach does not require any prior knowledge of the target device, which ensures our optimization adapting gray-box fuzzing and white-box fuzzing. We designed and implemented a contribution-aware coverage-guided fuzzer for smart devices, called StFuzzer. We evaluated StFuzzer on four real-world applications that are often applied on smart devices to demonstrate the efficiency of our contribution-aware optimization. The result of our trials shows that the contribution-aware approach significantly improves the capability of bug discovery and obtains better execution speed than state-of-the-art fuzzers.
引用
下载
收藏
页数:15
相关论文
共 45 条
  • [41] CAGFuzz: Coverage-Guided Adversarial Generative Fuzzing Testing for Image-Based Deep Learning Systems
    Zhang, Pengcheng
    Ren, Bin
    Dong, Hai
    Dai, Qiyin
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2022, 48 (11) : 4630 - 4646
  • [42] Unified HW/SW Coverage: A Novel Metric to Boost Coverage-guided Fuzzing for Virtual Prototype based HW/SW Co-Verification
    Bruns, Niklas
    Herdt, Vladimir
    Drechsler, Rolf
    PROCEEDINGS OF THE 2022 FORUM ON SPECIFICATION & DESIGN LANGUAGES (FDL), 2022,
  • [43] Toss a Fault to YourWitcher: Applying Grey-box Coverage-Guided Mutational Fuzzing to Detect SQL and Command Injection Vulnerabilities
    Trickel, Erik
    Pagani, Fabio
    Zhu, Chang
    Dresel, Lukas
    Vigna, Giovanni
    Kruegel, Christopher
    Wang, Ruoyu
    Bao, Tiffany
    Shoshitaishvili, Yan
    Doupe, Adam
    2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 2658 - 2675
  • [44] JMLKelinci plus : Detecting Semantic Bugs and Covering Branches with Valid Inputs Using Coverage-guided Fuzzing and Runtime Assertion Checking
    Nilizadeh, Amirfarhad
    Leavens, Gary T.
    Pasareanu, Corina S.
    Noller, Yannic
    FORMAL ASPECTS OF COMPUTING, 2024, 36 (01)
  • [45] A Coverage-Guided Fuzzing Method for Automatic Software Vulnerability Detection Using Reinforcement Learning-Enabled Multi-Level Input Mutation
    Pham, Van-Hau
    Hien, Do Thi Thu
    Chuong, Nguyen Phuc
    Thai, Pham Thanh
    Duy, Phan The
    IEEE ACCESS, 2024, 12 : 129064 - 129080