首页> 外文会议>International conference on ICT systems security and privacy protection >The Fuzzing Awakens: File Format-Aware Mutational Fuzzing on Smartphone Media Server Daemons
【24h】

The Fuzzing Awakens: File Format-Aware Mutational Fuzzing on Smartphone Media Server Daemons

机译:模糊唤醒:智能手机媒体服务器守护进程上的文件格式感知突变模糊

获取原文

摘要

Media server daemons, running with a high privilege in the background, are attractive attack vectors that exist across various systems including smartphones. Fuzzing is a popularly used methodology to find software vulnerabilities although symbolic execution and advanced techniques are obviously promising. Unfortunately, fuzzing itself is not effective in such format-strict environments as media services. Thus, we study file format-aware fuzzing as a technical blend for finding new vulnerabilities. We present our black-box mutational fuzzing on the latest smartphone systems, Android and iOS, respectively, with manipulation of the MPEG-4 Part 14 file format and show results that affect a wide range of related systems. In our approach, we automate a seed file selection process to crawl a crowd-sourcing public website and validate arbitrary m4a/mp4 audio files according to the FOURCC atom list we gained through white-box analysis in Android. We acquired eight seed files covering all effective atoms in 2,600s. We then performed size field mutation in a little amount and generated 1,102 test cases common to both systems. During six CPU hours of fuzzing, we identified three crash atoms in iOS 9.3.5 and 15 in Android 6.0.1, respectively. Due to format-awareness, we were able to easily locate crash points through a mutation table. It was discovered that the new crash atoms found in iOS allowed remote attackers to execute arbitrary code or cause a denial of service by memory corruption in iOS and also OS X, tvOS and watchOS.
机译:媒体服务器守护进程,在后台的高权限运行,是在包括智能手机的各种系统中存在的吸引力攻击向量。仿真是一种普遍使用的方法来寻找软件漏洞,尽管符号执行和高级技术显然很有前途。不幸的是,模糊本身在这种格式严格的环境中无效,作为媒体服务。因此,我们将文件格式感知模糊作为寻找新漏洞的技术融合。我们分别在最新的智能手机系统,Android和IOS上介绍了我们的黑匣子突变模糊,并操纵MPEG-4第14部分文件格式,并显示影响各种相关系统的结果。在我们的方法中,我们自动化种子文件选择过程以抓取一辆人群采购的公共网站,并根据我们通过Android中的白盒子分析获得的FourCC Atom列表验证任意M4A / MP4音频文件。我们收购了八个覆盖了2,600岁的所有有效原子的种子文件。然后,我们以少量执行大小的现场突变,并生成两个系统共有的1,102个测试用例。在六个CPU的模糊时间内,我们分别在Android 6.0.1中确定了IOS 9.3.5和15中的三个崩溃原子。由于格式意识,我们能够通过突变表轻松定位崩溃点。有人发现,IOS中发现的新碰撞原子允许远程攻击者执行任意代码或通过IOS中的内存损坏导致拒绝服务,以及OS X,TVOS和Watchos。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号