• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

DAFuzz:内存数据存储的数据感知模糊测试。

DAFuzz: data-aware fuzzing of in-memory data stores.

作者信息

Zeng Yingpei, Zhu Fengming, Zhang Siyi, Yang Yu, Yi Siyu, Pan Yufan, Xie Guojie, Wu Ting

机构信息

School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China.

Zhejiang Key Laboratory of Open Data, Hangzhou, China.

出版信息

PeerJ Comput Sci. 2023 Sep 19;9:e1592. doi: 10.7717/peerj-cs.1592. eCollection 2023.

DOI:10.7717/peerj-cs.1592
PMID:37810359
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10557509/
Abstract

Fuzzing has become an important method for finding vulnerabilities in software. For fuzzing programs expecting structural inputs, syntactic- and semantic-aware fuzzing approaches have been particularly proposed. However, they still cannot fuzz in-memory data stores sufficiently, since some code paths are only executed when the required data are available. In this article, we propose a data-aware fuzzing method, DAFuzz, which is designed by considering the data used during fuzzing. Specifically, to ensure different data-sensitive code paths are exercised, DAFuzz first loads different kinds of data into the stores before feeding fuzzing inputs. Then, when generating inputs, DAFuzz ensures the generated inputs are not only syntactically and semantically valid but also use the data correctly. We implement a prototype of DAFuzz based on Superion and use it to fuzz Redis and Memcached. Experiments show that DAFuzz covers 13~95% more edges than AFL, Superion, AFL++, and AFLNet, and discovers vulnerabilities over 2.7× faster. In total, we discovered four new vulnerabilities in Redis and Memcached. All the vulnerabilities were reported to developers and have been acknowledged and fixed.

摘要

模糊测试已成为发现软件漏洞的一种重要方法。对于期望结构化输入的模糊测试程序,尤其提出了语法感知和语义感知的模糊测试方法。然而,它们仍然无法充分地对内存数据存储进行模糊测试,因为某些代码路径仅在所需数据可用时才会执行。在本文中,我们提出了一种数据感知模糊测试方法DAFuzz,它是通过考虑模糊测试期间使用的数据而设计的。具体来说,为了确保不同的数据敏感代码路径得到执行,DAFuzz在输入模糊测试之前首先将不同类型的数据加载到存储中。然后,在生成输入时,DAFuzz确保生成的输入不仅在语法和语义上有效,而且正确使用了数据。我们基于Superion实现了DAFuzz的一个原型,并使用它对Redis和Memcached进行模糊测试。实验表明,DAFuzz比AFL、Superion、AFL++和AFLNet覆盖的边多13%至95%,发现漏洞的速度快2.7倍以上。我们总共在Redis和Memcached中发现了四个新漏洞。所有漏洞均已报告给开发者,且已得到认可并修复。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b01e/10557509/1d6d0d19b646/peerj-cs-09-1592-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b01e/10557509/f8cd785f7410/peerj-cs-09-1592-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b01e/10557509/2451dd9ef367/peerj-cs-09-1592-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b01e/10557509/85e8a97d0e4f/peerj-cs-09-1592-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b01e/10557509/2a7d210b5ba2/peerj-cs-09-1592-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b01e/10557509/da9b7e114ff6/peerj-cs-09-1592-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b01e/10557509/52f4be9e46c8/peerj-cs-09-1592-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b01e/10557509/073c94982f11/peerj-cs-09-1592-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b01e/10557509/1d6d0d19b646/peerj-cs-09-1592-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b01e/10557509/f8cd785f7410/peerj-cs-09-1592-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b01e/10557509/2451dd9ef367/peerj-cs-09-1592-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b01e/10557509/85e8a97d0e4f/peerj-cs-09-1592-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b01e/10557509/2a7d210b5ba2/peerj-cs-09-1592-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b01e/10557509/da9b7e114ff6/peerj-cs-09-1592-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b01e/10557509/52f4be9e46c8/peerj-cs-09-1592-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b01e/10557509/073c94982f11/peerj-cs-09-1592-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b01e/10557509/1d6d0d19b646/peerj-cs-09-1592-g008.jpg

相似文献

1
DAFuzz: data-aware fuzzing of in-memory data stores.DAFuzz:内存数据存储的数据感知模糊测试。
PeerJ Comput Sci. 2023 Sep 19;9:e1592. doi: 10.7717/peerj-cs.1592. eCollection 2023.
2
V-Fuzz: Vulnerability Prediction-Assisted Evolutionary Fuzzing for Binary Programs.V-Fuzz:二进制程序漏洞预测辅助进化模糊测试。
IEEE Trans Cybern. 2022 May;52(5):3745-3756. doi: 10.1109/TCYB.2020.3013675. Epub 2022 May 19.
3
CONFU: Configuration Fuzzing Testing Framework for Software Vulnerability Detection.CONFU:用于软件漏洞检测的配置模糊测试框架。
Int J Secur Softw Eng. 2010;1(3):41-55. doi: 10.4018/jsse.2010070103.
4
Configuration Fuzzing for Software Vulnerability Detection.用于软件漏洞检测的配置模糊测试
Proc Int Conf Availab Reliab Secur. 2010 Feb 15:525-530. doi: 10.1109/ares.2010.22.
5
A systematic review of fuzzing based on machine learning techniques.基于机器学习技术的模糊测试系统综述。
PLoS One. 2020 Aug 18;15(8):e0237749. doi: 10.1371/journal.pone.0237749. eCollection 2020.
6
MultiFuzz: A Coverage-Based Multiparty-Protocol Fuzzer for IoT Publish/Subscribe Protocols.MultiFuzz:一种用于物联网发布/订阅协议的基于覆盖的多方协议模糊测试器。
Sensors (Basel). 2020 Sep 11;20(18):5194. doi: 10.3390/s20185194.
7
Vulnerability-oriented directed fuzzing for binary programs.面向漏洞的二进制程序定向模糊测试。
Sci Rep. 2022 Mar 11;12(1):4271. doi: 10.1038/s41598-022-07355-5.
8
Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.基于网络流量分析和二进制逆向工程的协议漏洞检测
PLoS One. 2017 Oct 19;12(10):e0186188. doi: 10.1371/journal.pone.0186188. eCollection 2017.
9
A model-guided symbolic execution approach for network protocol implementations and vulnerability detection.一种用于网络协议实现和漏洞检测的模型引导符号执行方法。
PLoS One. 2017 Nov 16;12(11):e0188229. doi: 10.1371/journal.pone.0188229. eCollection 2017.
10
Smarter Evolution: Enhancing Evolutionary Black Box Fuzzing with Adaptive Models.更智能的进化:用自适应模型增强进化黑盒模糊测试
Sensors (Basel). 2023 Sep 13;23(18):7864. doi: 10.3390/s23187864.

本文引用的文献

1
MultiFuzz: A Coverage-Based Multiparty-Protocol Fuzzer for IoT Publish/Subscribe Protocols.MultiFuzz:一种用于物联网发布/订阅协议的基于覆盖的多方协议模糊测试器。
Sensors (Basel). 2020 Sep 11;20(18):5194. doi: 10.3390/s20185194.