2020
DOI: 10.48550/arxiv.2002.10751
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities

Abstract: Directed fuzzing focuses on automatically testing specific parts of the code by taking advantage of additional information such as (partial) bug stack trace, patches or risky operations. Key applications include bug reproduction, patch testing and static analysis report verification. Although directed fuzzing has received a lot of attention recently, hard-to-detect vulnerabilities such as Use-After-Free (UAF) are still not well addressed, more especially at the binary level. We propose UAFUZZ, the first (binar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(25 citation statements)
references
References 37 publications
0
25
0
Order By: Relevance
“…For example, selecting critical sites, such as memory allocation function malloc() or string manipulation function strcpy(), as targets are more likely to trigger memory corruption bugs. Besides, we can leverage the relationship among targets to accelerate detecting complex behavioral bugs, such as use-after-free [22,28]. Thus, the involvement of targets gives more chance to optimize DGF by applying customized techniques that are specific to DGF.…”
Section: Difference Between Cgf and Dgfmentioning
confidence: 99%
See 4 more Smart Citations
“…For example, selecting critical sites, such as memory allocation function malloc() or string manipulation function strcpy(), as targets are more likely to trigger memory corruption bugs. Besides, we can leverage the relationship among targets to accelerate detecting complex behavioral bugs, such as use-after-free [22,28]. Thus, the involvement of targets gives more chance to optimize DGF by applying customized techniques that are specific to DGF.…”
Section: Difference Between Cgf and Dgfmentioning
confidence: 99%
“…For example, in order to trigger use-after-free vulnerabilities, a sequence of operations (e.g., allocate memory, use memory, and free memory) must be executed in a specific order. UAFuzz [22] and UAFL [28] leverages target sequences instead of target sites to find use-after-free vulnerabilities. LOLLY [23] also uses target statement sequences to guide greybox fuzzing to trigger bugs that resulted from the sequential execution of multiple statements.…”
Section: Assessment Of The-state-of-the-art Workmentioning
confidence: 99%
See 3 more Smart Citations