首页    期刊浏览 2024年11月30日 星期六
登录注册

文章基本信息

  • 标题:DeepDiver: Diving into Abysmal Depth of the Binary for Hunting Deeply Hidden Software Vulnerabilities
  • 本地全文:下载
  • 作者:Fayozbek Rustamov ; Juhwan Kim ; JooBeom Yun
  • 期刊名称:Future Internet
  • 电子版ISSN:1999-5903
  • 出版年度:2020
  • 卷号:12
  • 期号:4
  • 页码:74-92
  • DOI:10.3390/fi12040074
  • 出版社:MDPI Publishing
  • 摘要:Fuzz testing is a simple automated software testing approach that discovers software vulnerabilities at a high level of performance by using randomly generated seeds. However, it is restrained by coverage and thus, there are chances of finding bugs entrenched in the deep execution paths of the program. To eliminate these limitations in mutational fuzzers, patching-based fuzzers and hybrid fuzzers have been proposed as groundbreaking advancements which combine two software testing approaches. Despite those methods having demonstrated high performance across different benchmarks such as DARPA CGC programs, they still present deficiencies in their ability to analyze deeper code branches and in bypassing the roadblocks checks (magic bytes, checksums) in real-world programs. In this research, we design DeepDiver, a novel transformational hybrid fuzzing tool that explores deeply hidden software vulnerabilities. Our approach tackles limitations exhibited by existing hybrid fuzzing frameworks, by negating roadblock checks (RC) in the program. By negating the RCs, the hybrid fuzzer can explore new execution paths to trigger bugs that are hidden in the abysmal depths of the binary. We combine AFL and concolic execution engine and leveraged the trace analyzer approach to construct the tree for each input to detect RCs. To demonstrate the efficiency of DeepDiver, we tested it with the LAVA-M dataset and eight large real-world programs. Overall, DeepDiver outperformed existing software testing tools, including the patching-based fuzzer and state-of-the-art hybrid fuzzing techniques. On average, DeepDiver discovered vulnerabilities 32.2% and 41.6% faster than QSYM and AFLFast respectively, and it accomplished in-depth code coverage.
  • 关键词:software vulnerability; hybrid fuzzing; concolic execution; patching-based fuzzing software vulnerability ; hybrid fuzzing ; concolic execution ; patching-based fuzzing
国家哲学社会科学文献中心版权所有