• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

V-Fuzz:二进制程序漏洞预测辅助进化模糊测试。

V-Fuzz: Vulnerability Prediction-Assisted Evolutionary Fuzzing for Binary Programs.

出版信息

IEEE Trans Cybern. 2022 May;52(5):3745-3756. doi: 10.1109/TCYB.2020.3013675. Epub 2022 May 19.

DOI:10.1109/TCYB.2020.3013675
PMID:32946405
Abstract

Fuzzing is a technique of finding bugs by executing a target program recurrently with a large number of abnormal inputs. Most of the coverage-based fuzzers consider all parts of a program equally and pay too much attention to how to improve the code coverage. It is inefficient as the vulnerable code only takes a tiny fraction of the entire code. In this article, we design and implement an evolutionary fuzzing framework called V-Fuzz, which aims to find bugs efficiently and quickly in limited time for binary programs. V-Fuzz consists of two main components: 1) a vulnerability prediction model and 2) a vulnerability-oriented evolutionary fuzzer. Given a binary program to V-Fuzz, the vulnerability prediction model will give a prior estimation on which parts of a program are more likely to be vulnerable. Then, the fuzzer leverages an evolutionary algorithm to generate inputs which are more likely to arrive at the vulnerable locations, guided by the vulnerability prediction result. The experimental results demonstrate that V-Fuzz can find bugs efficiently with the assistance of vulnerability prediction. Moreover, V-Fuzz has discovered ten common vulnerabilities and exposures (CVEs), and three of them are newly discovered.

摘要

模糊测试是一种通过用大量异常输入反复执行目标程序来发现错误的技术。大多数基于覆盖的模糊测试器平等地考虑程序的所有部分,并过于关注如何提高代码覆盖率。这是低效的,因为易受攻击的代码只占整个代码的一小部分。在本文中,我们设计并实现了一种称为 V-Fuzz 的进化模糊测试框架,旨在在有限的时间内为二进制程序有效地快速发现错误。V-Fuzz 由两个主要组件组成:1)漏洞预测模型和 2)面向漏洞的进化模糊测试器。给定一个二进制程序到 V-Fuzz,漏洞预测模型将对程序的哪些部分更有可能易受攻击进行先验估计。然后,模糊测试器利用进化算法生成更有可能到达易受攻击位置的输入,由漏洞预测结果指导。实验结果表明,V-Fuzz 在漏洞预测的帮助下可以有效地发现错误。此外,V-Fuzz 发现了十个常见漏洞和暴露(CVE),其中三个是新发现的。

相似文献

1
V-Fuzz: Vulnerability Prediction-Assisted Evolutionary Fuzzing for Binary Programs.V-Fuzz:二进制程序漏洞预测辅助进化模糊测试。
IEEE Trans Cybern. 2022 May;52(5):3745-3756. doi: 10.1109/TCYB.2020.3013675. Epub 2022 May 19.
2
Vulnerability-oriented directed fuzzing for binary programs.面向漏洞的二进制程序定向模糊测试。
Sci Rep. 2022 Mar 11;12(1):4271. doi: 10.1038/s41598-022-07355-5.
3
A systematic review of fuzzing based on machine learning techniques.基于机器学习技术的模糊测试系统综述。
PLoS One. 2020 Aug 18;15(8):e0237749. doi: 10.1371/journal.pone.0237749. eCollection 2020.
4
DAFuzz: data-aware fuzzing of in-memory data stores.DAFuzz:内存数据存储的数据感知模糊测试。
PeerJ Comput Sci. 2023 Sep 19;9:e1592. doi: 10.7717/peerj-cs.1592. eCollection 2023.
5
MultiFuzz: A Coverage-Based Multiparty-Protocol Fuzzer for IoT Publish/Subscribe Protocols.MultiFuzz:一种用于物联网发布/订阅协议的基于覆盖的多方协议模糊测试器。
Sensors (Basel). 2020 Sep 11;20(18):5194. doi: 10.3390/s20185194.
6
Ffuzz: Towards full system high coverage fuzz testing on binary executables.Ffuzz:二进制可执行文件的全系统高覆盖率模糊测试方法。
PLoS One. 2018 May 23;13(5):e0196733. doi: 10.1371/journal.pone.0196733. eCollection 2018.
7
CONFU: Configuration Fuzzing Testing Framework for Software Vulnerability Detection.CONFU:用于软件漏洞检测的配置模糊测试框架。
Int J Secur Softw Eng. 2010;1(3):41-55. doi: 10.4018/jsse.2010070103.
8
Configuration Fuzzing for Software Vulnerability Detection.用于软件漏洞检测的配置模糊测试
Proc Int Conf Availab Reliab Secur. 2010 Feb 15:525-530. doi: 10.1109/ares.2010.22.
9
Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.基于网络流量分析和二进制逆向工程的协议漏洞检测
PLoS One. 2017 Oct 19;12(10):e0186188. doi: 10.1371/journal.pone.0186188. eCollection 2017.
10
RLTG: Multi-targets directed greybox fuzzing.RLTG:多目标导向的灰盒模糊测试。
PLoS One. 2023 Apr 12;18(4):e0278138. doi: 10.1371/journal.pone.0278138. eCollection 2023.

引用本文的文献

1
A Survey of the Security Analysis of Embedded Devices.嵌入式设备安全分析综述
Sensors (Basel). 2023 Nov 16;23(22):9221. doi: 10.3390/s23229221.