【24h】

Expediting Binary Fuzzing with Symbolic Analysis

机译:使用符号分析加快二进制模糊测试

获取原文
获取原文并翻译 | 示例
       

摘要

Fuzzing is an important method for binary vulnerability mining. It can analyze binary programs without their source codes, which is not easy to do by other technologies. But due to the blindness of input generation, binary fuzzing often falls into traps for a long time when the new mutated inputs cannot generate unexplored paths. In this paper, we propose an efficient and flexible fuzzing framework named Tinker. It defines the growth rate of path coverage to measure the current state of fuzzing. If the fuzzing falls into low-speed or blocked states, a symbolic analysis procedure is invoked to generate a new input which can help the fuzzing jump out of the trap. In the symbolic analysis procedure, we employ dynamic execution to track the traversed nodes. The untraversed branches are then identified according to the recorded data of American Fuzzy Lop (AFL) [M. Zalewski, American Fuzzy Lop (2014), http://lcamtuf.coredump.cx/afl/]. At last, we employ control flow graph (CFG) to construct complete paths to these branches and a new input is generated using symbolic execution. Moreover, to expedite the detection of vulnerabilities, we generate inputs which trigger more high-risk system calls first, such that the possibility of finding vulnerabilities can be improved. Tinker has been implemented and the experiments on DARPA CGC benchmark show that Tinker is more efficient in vulnerability mining than state-of-the-art binary vulnerability mining tools.
机译:模糊测试是二进制漏洞挖掘的一种重要方法。它可以分析没有源代码的二进制程序,这是其他技术不容易做到的。但是由于输入生成的盲目性,当新的变异输入无法生成未探索的路径时,二进制模糊通常会长时间陷入陷阱。在本文中,我们提出了一种有效且灵活的模糊测试框架,称为Tinker。它定义了路径覆盖的增长率来衡量当前的模糊状态。如果绒毛进入低速或阻塞状态,则将执行符号分析过程以生成新的输入,这可以帮助绒毛跳出陷阱。在符号分析过程中,我们采用动态执行来跟踪所遍历的节点。然后根据记录的American Fuzzy Lop(AFL)数据确定未遍历的分支。 Zalewski,《 American Fuzzy Lop》(2014年),http://lcamt​​uf.coredump.cx/afl/]。最后,我们使用控制流图(CFG)构造到这些分支的完整路径,并使用符号执行生成新的输入。此外,为了加快漏洞检测速度,我们生成了首先触发更多高风险系统调用的输入,从而可以提高发现漏洞的可能性。 Tinker已实施,DARPA CGC基准测试表明,Tinker在漏洞挖掘方面比最先进的二进制漏洞挖掘工具更有效。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号