跳至主導覽 跳至搜尋 跳過主要內容

CRAXfuzz: Target-Aware Symbolic Fuzz Testing

研究成果: Conference contribution同行評審

5 引文 斯高帕斯(Scopus)

摘要

Vulnerabilities are caused by implementation bugs, such as buffer overflow, integer overflow, uncontrolled format strings, and command injection flaws. They are often exploited to intrude software systems. In order to reduce software bugs, testing techniques are proposed. The recent technique to discover security-related bugs is fuzz testing. However, traditional fuzzers can only find bugs when program exceptions, especially crashes, raised. Some security threats may pass these tests due to insufficient code coverage. In this paper, we introduce a software testing framework based on symbolic execution using S2E, a whole system symbolic execution engine. When a program executes our pre-defined security sensitive functions, such as malloc, strcpy or printf, our framework will initiate a triage process. The process will determine whether any related security vulnerabilities would possibly occur in these functions automatically. We successfully and efficiently reproduce 12 previously known vulnerabilities from normal input data within 100 seconds for large applications such as Tiff, VIM, and MPlayer. Our tool can help developers locate bugs faster, and improve the efficiency of software quality maintenance.

原文English
主出版物標題Proceedings - 2015 IEEE 39th Annual Computer Software and Applications Conference, COMPSAC 2015
編輯Gang Huang, Jingwei Yang, Sheikh Iqbal Ahamed, Pao-Ann Hsiung, Carl K. Chang, William Chu, Ivica Crnkovic
發行者IEEE Computer Society
頁面460-471
頁數12
ISBN(電子)9781467365635
DOIs
出版狀態Published - 21 9月 2015
事件39th IEEE Annual Computer Software and Applications Conference, COMPSAC 2015 - Taichung, 台灣
持續時間: 1 7月 20155 7月 2015

出版系列

名字Proceedings - International Computer Software and Applications Conference
2
ISSN(列印)0730-3157

Conference

Conference39th IEEE Annual Computer Software and Applications Conference, COMPSAC 2015
國家/地區台灣
城市Taichung
期間1/07/155/07/15

指紋

深入研究「CRAXfuzz: Target-Aware Symbolic Fuzz Testing」主題。共同形成了獨特的指紋。

引用此