BugMiner: Mining the Hard-to-Reach Software Vulnerabilities through the Target-Oriented Hybrid Fuzzer

Rustamov, Fayozbek and Kim, Juhwan and Yu, Jihyeon and Kim, Hyunwook and Yun, Joobeom (2020) BugMiner: Mining the Hard-to-Reach Software Vulnerabilities through the Target-Oriented Hybrid Fuzzer. Electronics, 10 (1). p. 62. ISSN 2079-9292

[thumbnail of electronics-10-00062-v2.pdf] Text
electronics-10-00062-v2.pdf - Published Version

Download (1MB)

Abstract

Greybox Fuzzing is the most reliable and essentially powerful technique for automated software testing. Notwithstanding, a majority of greybox fuzzers are not effective in directed fuzzing, for example, towards complicated patches, as well as towards suspicious and critical sites. To overcome these limitations of greybox fuzzers, Directed Greybox Fuzzing (DGF) approaches were recently proposed. Current DGFs are powerful and efficient approaches that can compete with Coverage-Based Fuzzers. Nevertheless, DGFs neglect to accomplish stability between usefulness and proficiency, and random mutations make it hard to handle complex paths. To alleviate this problem, we propose an innovative methodology, a target-oriented hybrid fuzzing tool that utilizes a fuzzer and dynamic symbolic execution (also referred to as a concolic execution) engine. Our proposed method aims to generate inputs that can quickly reach the target sites in each sequence and trigger potential hard-to-reach vulnerabilities in the program binary. Specifically, to dive deep into the target binary, we designed a proposed technique named BugMiner, and to demonstrate the capability of our implementation, we evaluated it comprehensively on bug hunting and crash reproduction. Evaluation results showed that our proposed implementation could not only trigger hard-to-reach bugs 3.1, 4.3, 2.9, 2.0, 1.8, and 1.9 times faster than Hawkeye, AFLGo, AFL, AFLFast, QSYM, and ParmeSan respectively but also scale to several real-world programs.

Item Type: Article
Uncontrolled Keywords: directed fuzzing; hybrid fuzzing; concolic execution; software vulnerability; natural language processing
Subjects: STM Repository > Engineering
Depositing User: Managing Editor
Date Deposited: 30 Jul 2024 06:00
Last Modified: 30 Jul 2024 06:00
URI: http://classical.goforpromo.com/id/eprint/721

Actions (login required)

View Item
View Item