Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Automatically Seed Corpus and Fuzzing Executables Generation Using Test Framework

Full metadata record
DC Field Value Language
dc.contributor.authorJeon, Sanghoon-
dc.contributor.authorRyu, Minsoo-
dc.contributor.authorKim, Dongyoung-
dc.contributor.authorKim, Huy Kang-
dc.date.accessioned2022-10-07T02:40:36Z-
dc.date.available2022-10-07T02:40:36Z-
dc.date.created2022-10-06-
dc.date.issued2022-
dc.identifier.issn2169-3536-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/144186-
dc.description.abstractFuzzing is widely utilized as a practical test method to determine unknown vulnerabilities in software. Although fuzzing shows excellent results for code coverage and crash count, it is not easy to apply these effects to library fuzzing. A library cannot run independently; it is only executed by an application called a customer program. In particular, a fuzzing executable and a seed corpus are needed to execute the library code by calling a specific function sequence and passing the input of the fuzzer to reproduce the various states of the library. However, preparing the environment for library fuzzing is challenging because it relies on the human expertise and requires both an understanding of the library and fuzzing knowledge. This study proposes FuzzBuilderEx, a system that provides an automated fuzzing environment for a library by utilizing the test framework to resolve this problem. FuzzBuilderEx conducts a static/dynamic analysis of the test code to automatically generate seed corpus and fuzzing executables that enable library fuzzing. Furthermore, the automatically generated seed corpus and fuzzing executable are compatible with existing fuzzers, such as the American Fuzzy Lop (AFL). This study applied FuzzBuilderEx to nine open-source libraries for performance evaluation and confirmed the effects of an increase in code coverage by 31.2% and a unique crash count of 58.7% compared to previous studies. Notably, we detected three zero-day vulnerabilities and registered one of them in the common vulnerabilities and exposures (CVE) database.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.titleAutomatically Seed Corpus and Fuzzing Executables Generation Using Test Framework-
dc.typeArticle-
dc.contributor.affiliatedAuthorKim, Huy Kang-
dc.identifier.doi10.1109/ACCESS.2022.3202005-
dc.identifier.scopusid2-s2.0-85137572200-
dc.identifier.wosid000850855000001-
dc.identifier.bibliographicCitationIEEE ACCESS, v.10, pp.90408 - 90428-
dc.relation.isPartOfIEEE ACCESS-
dc.citation.titleIEEE ACCESS-
dc.citation.volume10-
dc.citation.startPage90408-
dc.citation.endPage90428-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.isOpenAccessY-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordAuthorFuzzing-
dc.subject.keywordAuthorPerformance evaluation-
dc.subject.keywordAuthorCodes-
dc.subject.keywordAuthorOpen source software-
dc.subject.keywordAuthorDeep learning-
dc.subject.keywordAuthorData models-
dc.subject.keywordAuthorSequential analysis-
dc.subject.keywordAuthorComputer crashes-
dc.subject.keywordAuthorData-driven security-
dc.subject.keywordAuthorfuzzing-
dc.subject.keywordAuthorseed generation-
dc.subject.keywordAuthorvulnerability detection-
dc.subject.keywordAuthortest framework-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE