Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Automatically Seed Corpus and Fuzzing Executables Generation Using Test Frameworkopen access

Authors
Jeon, SanghoonRyu, MinsooKim, DongyoungKim, Huy Kang
Issue Date
2022
Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
Keywords
Fuzzing; Performance evaluation; Codes; Open source software; Deep learning; Data models; Sequential analysis; Computer crashes; Data-driven security; fuzzing; seed generation; vulnerability detection; test framework
Citation
IEEE ACCESS, v.10, pp.90408 - 90428
Indexed
SCIE
SCOPUS
Journal Title
IEEE ACCESS
Volume
10
Start Page
90408
End Page
90428
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/144186
DOI
10.1109/ACCESS.2022.3202005
ISSN
2169-3536
Abstract
Fuzzing is widely utilized as a practical test method to determine unknown vulnerabilities in software. Although fuzzing shows excellent results for code coverage and crash count, it is not easy to apply these effects to library fuzzing. A library cannot run independently; it is only executed by an application called a customer program. In particular, a fuzzing executable and a seed corpus are needed to execute the library code by calling a specific function sequence and passing the input of the fuzzer to reproduce the various states of the library. However, preparing the environment for library fuzzing is challenging because it relies on the human expertise and requires both an understanding of the library and fuzzing knowledge. This study proposes FuzzBuilderEx, a system that provides an automated fuzzing environment for a library by utilizing the test framework to resolve this problem. FuzzBuilderEx conducts a static/dynamic analysis of the test code to automatically generate seed corpus and fuzzing executables that enable library fuzzing. Furthermore, the automatically generated seed corpus and fuzzing executable are compatible with existing fuzzers, such as the American Fuzzy Lop (AFL). This study applied FuzzBuilderEx to nine open-source libraries for performance evaluation and confirmed the effects of an increase in code coverage by 31.2% and a unique crash count of 58.7% compared to previous studies. Notably, we detected three zero-day vulnerabilities and registered one of them in the common vulnerabilities and exposures (CVE) database.
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE