ProFuzzer: On-the-fly Input Type Probing for Better Zero-Day Vulnerability Discovery

Wei You, Xueqiang Wang, Shiqing Ma, Jianjun Huang, X. Zhang, Xiaofeng Wang, Bin Liang
{"title":"ProFuzzer: On-the-fly Input Type Probing for Better Zero-Day Vulnerability Discovery","authors":"Wei You, Xueqiang Wang, Shiqing Ma, Jianjun Huang, X. Zhang, Xiaofeng Wang, Bin Liang","doi":"10.1109/SP.2019.00057","DOIUrl":null,"url":null,"abstract":"Existing mutation based fuzzers tend to randomly mutate the input of a program without understanding its underlying syntax and semantics. In this paper, we propose a novel on-the-fly probing technique (called ProFuzzer) that automatically recovers and understands input fields of critical importance to vulnerability discovery during a fuzzing process and intelligently adapts the mutation strategy to enhance the chance of hitting zero-day targets. Since such probing is transparently piggybacked to the regular fuzzing, no prior knowledge of the input specification is needed. During fuzzing, individual bytes are first mutated and their fuzzing results are automatically analyzed to link those related together and identify the type for the field connecting them; these bytes are further mutated together following type-specific strategies, which substantially prunes the search space. We define the probe types generally across all applications, thereby making our technique application agnostic. Our experiments on standard benchmarks and real-world applications show that ProFuzzer substantially outperforms AFL and its optimized version AFLFast, as well as other state-of-art fuzzers including VUzzer, Driller and QSYM. Within two months, it exposed 42 zero-days in 10 intensively tested programs, generating 30 CVEs.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"96","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE Symposium on Security and Privacy (SP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SP.2019.00057","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 96

Abstract

Existing mutation based fuzzers tend to randomly mutate the input of a program without understanding its underlying syntax and semantics. In this paper, we propose a novel on-the-fly probing technique (called ProFuzzer) that automatically recovers and understands input fields of critical importance to vulnerability discovery during a fuzzing process and intelligently adapts the mutation strategy to enhance the chance of hitting zero-day targets. Since such probing is transparently piggybacked to the regular fuzzing, no prior knowledge of the input specification is needed. During fuzzing, individual bytes are first mutated and their fuzzing results are automatically analyzed to link those related together and identify the type for the field connecting them; these bytes are further mutated together following type-specific strategies, which substantially prunes the search space. We define the probe types generally across all applications, thereby making our technique application agnostic. Our experiments on standard benchmarks and real-world applications show that ProFuzzer substantially outperforms AFL and its optimized version AFLFast, as well as other state-of-art fuzzers including VUzzer, Driller and QSYM. Within two months, it exposed 42 zero-days in 10 intensively tested programs, generating 30 CVEs.
ProFuzzer:实时输入类型探测,更好地发现零日漏洞
现有的基于突变的模糊器倾向于在不了解其底层语法和语义的情况下随机改变程序的输入。在本文中,我们提出了一种新的实时探测技术(称为ProFuzzer),该技术在模糊过程中自动恢复和理解对漏洞发现至关重要的输入字段,并智能地适应突变策略以提高命中零日目标的机会。由于这种探测是透明地与常规模糊测试结合在一起的,因此不需要事先了解输入规范。在模糊测试过程中,首先对单个字节进行突变,然后自动分析其模糊测试结果,将相关的字节连接在一起,并识别连接它们的字段的类型;这些字节按照特定于类型的策略进一步变异在一起,这大大减少了搜索空间。我们通常在所有应用程序中定义探针类型,从而使我们的技术与应用程序无关。我们在标准基准测试和实际应用中进行的实验表明,ProFuzzer的性能大大优于AFL及其优化版本AFLFast,以及其他最先进的fuzzer,包括VUzzer, Driller和QSYM。在两个月内,它在10个密集测试程序中暴露了42个零日漏洞,产生了30个cve。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信