Return to search

Practical Methods for Fuzzing Real-World Systems

<p>The current software ecosystem is exceptionally complex. A key defining feature of this complexity is the vast input space that software applications must process. This feature</p>
<p>inhibits fuzzing (an effective automated testing methodology) in uncovering deep bugs (i.e.,</p>
<p>bugs with complex preconditions). We improve the bug-finding capabilities of fuzzers by</p>
<p>reducing the input space that they have to explore. Our techniques incorporate domain</p>
<p>knowledge from the software under test. In this dissertation, we research how to incorporate</p>
<p>domain knowledge in different scenarios across a variety of software domains and test</p>
<p>objectives to perform deep bug discovery.</p>
<p>We start by focusing on language interpreters that form the backend of our web ecosystem.</p>
<p>Uncovering deep bugs in these interpreters requires synthesizing inputs that perform a</p>
<p>diverse set of semantic actions. To tackle this issue, we present Gramatron, a fuzzer that employs grammar automatons to speed up bug discovery. Then, we explore firmwares belonging to the rapidly growing IoT ecosystem which generally lack thorough testing. FirmFuzz infers the appropriate runtime state required to trigger vulnerabilities in these firmwares using the domain knowledge encoded in the user-facing network applications. Additionally, we showcase how our proposed strategy to incorporate domain knowledge is beneficial under alternative testing scenarios where a developer analyzes specific code locations, e.g., for patch testing. SieveFuzz leverages knowledge of targeted code locations to prohibit exploration of code regions and correspondingly parts of the input space that are irrelevant to reaching the target location. Finally, we move beyond the realm of memory-safety vulnerabilities and present how domain knowledge can be useful in uncovering logical bugs, specifically deserialization vulnerabilities in Java-based applications with Crystallizer. Crystallizer uses a hybrid analysis methodology to first infer an over-approximate set of possible payloads through static analysis (to constrain the search space). Then, it uses dynamic analysis to instantiate concrete payloads as a proof-of-concept of a deserialization vulnerability.</p>
<p>Throughout these four diverse areas we thoroughly demonstrate how incorporating domain</p>
<p>knowledge can massively improve bug finding capabilities. Our research has developed</p>
<p>tooling that not only outperforms the existing state-of-the-art in terms of efficient bug discovery (with speeds up to 117% faster), but has also uncovered 18 previously unknown bugs,</p>
<p>with five CVEs assigned.</p>

  1. 10.25394/pgs.22693258.v1
Identiferoai:union.ndltd.org:purdue.edu/oai:figshare.com:article/22693258
Date27 April 2023
CreatorsPrashast Srivastava (15353365)
Source SetsPurdue University
Detected LanguageEnglish
TypeText, Thesis
RightsCC BY 4.0
Relationhttps://figshare.com/articles/thesis/Practical_Methods_for_Fuzzing_Real-World_Systems/22693258

Page generated in 0.0017 seconds