KSG: Augmenting Kernel Fuzzing with System Call Specification Generation

被引:0
|
作者
Sun, Hao [1 ]
Shen, Yuheng [1 ]
Liu, Jianzhong [1 ]
Xu, Yiru [1 ]
Jiang, Yu [1 ]
机构
[1] Tsinghua Univ, Beijing, Peoples R China
来源
PROCEEDINGS OF THE 2022 USENIX ANNUAL TECHNICAL CONFERENCE | 2022年
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Kernel fuzzing is a dynamic testing technique that has successfully found numerous kernel vulnerabilities. However, existing kernel fuzzers, such as Syzkaller, depend on system call specifications to generate test cases. Writing such specifications requires an immense amount of domain knowledge while being extremely laborious. Meanwhile, automated generation of the specification is still an open problem due to the complexity of the kernel, including entry function extraction and input type identification. As a result, the current amount of system call information is insufficient to test the entire kernel code base thoroughly. Syzkaller covers an average of 38% of Linux kernel code with current Syzlang specifications for a prolonged time of fuzzing. In this paper, we propose KSG to generate system call specifications for kernel fuzzers automatically. First, it utilizes probe-based tracing to extract entry functions accurately. Then, it uses path-sensitive analysis to collect precise input types and range constraints in each execution path of entry functions. Based on the aforementioned information, KSG generates specifications in the domain language Syzlang, which is used by most kernel fuzzers. We evaluated KSG on several versions of the Linux kernel. It automatically generated 2433 unique specifications. Leveraging the newly generated specifications, Syzkaller and Moonshine achieved coverage improvements of 22% and 23% respectively. Furthermore, our approach assisted fuzzers to discover 26 previously unknown bugs, where 13 and 6 bugs were fixed and assigned with CVEs, respectively.
引用
收藏
页码:351 / 365
页数:15
相关论文
共 50 条
  • [21] Additional kernel observer: privilege escalation attack prevention mechanism focusing on system call privilege changes
    Yamauchi, Toshihiro
    Akao, Yohei
    Yoshitani, Ryota
    Nakamura, Yuichi
    Hashimoto, Masaki
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 20 (04) : 461 - 473
  • [22] Extracting the system call identifier from within VFS: A kernel stack parsing-based approach
    Das, Suvrojit
    Chatterjee, Debayan
    Ghosh, D.
    Debnath, Narayan C.
    International Journal of Information and Computer Security, 2014, 6 (01) : 12 - 50
  • [23] Additional kernel observer: privilege escalation attack prevention mechanism focusing on system call privilege changes
    Toshihiro Yamauchi
    Yohei Akao
    Ryota Yoshitani
    Yuichi Nakamura
    Masaki Hashimoto
    International Journal of Information Security, 2021, 20 : 461 - 473
  • [24] FORMAL SYSTEM OF SPECIFICATION, GENERATION AND ANALYSIS OF MESSAGE STRUCTURES IN DISTRIBUTED COMPUTER-SYSTEMS
    ZAITSEV, SS
    KRAVTSUNOV, MI
    AVTOMATIKA I VYCHISLITELNAYA TEKHNIKA, 1985, (03): : 5 - 15
  • [25] Augmenting the Power System Toolbox: Enabling Automatic Generation Control and Providing a Platform for Cyber Security Analysis
    Zhang, Jiangmeng
    Dominguez-Garcia, Alejandro. D.
    2016 North American Power Symposium (NAPS), 2016,
  • [26] TwinDroid: A Dataset of Android app System call traces and Trace Generation Pipeline
    Razagallah, Asma
    Khoury, Raphael
    Poulet, Jean-Baptiste
    2022 MINING SOFTWARE REPOSITORIES CONFERENCE (MSR 2022), 2022, : 591 - 595
  • [27] A Japanese CALL System based on Dynamic Question Generation and Error Prediction for ASR
    Wang, Hongcui
    Kawahara, Tatsuya
    INTERSPEECH 2008: 9TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION 2008, VOLS 1-5, 2008, : 1737 - 1740
  • [28] A Dataset Generator for Next Generation System Call Host Intrusion Detection Systems
    Pendleton, Marcus
    Xu, Shouhuai
    MILCOM 2017 - 2017 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2017, : 231 - 236
  • [29] Information System Services Generation of Business Services Specification and Based on a System-of-Services Logical Architecture Pattern
    Simonin, Jacques
    Pillain, Pierre-Yves
    Gueriot, Didier
    Vincent, Johanne
    INTERNATIONAL JOURNAL OF COOPERATIVE INFORMATION SYSTEMS, 2020, 29 (03)
  • [30] The architecture of host-based intrusion detection model generation system for the frequency per system call
    Paek, Seung-Hyun
    Oh, Yoon-Keun
    Yun, JooBeom
    Lee, Do-Hoon
    2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2006, : 277 - 283