2019
DOI: 10.1145/3360600
|View full text |Cite
|
Sign up to set email alerts
|

FuzzFactory: domain-specific fuzzing with waypoints

Abstract: Coverage-guided fuzz testing has gained prominence as a highly effective method of finding security vulnerabilities such as buffer overflows in programs that parse binary data. Recently, researchers have introduced various specializations to the coverage-guided fuzzing algorithm for different domain-specific testing goals, such as finding performance bottlenecks, generating valid inputs, handling magic-byte comparisons, etc. Each such solution can require non-trivial implementation effort and produces a distin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 48 publications
(17 citation statements)
references
References 22 publications
0
17
0
Order By: Relevance
“…In addition to AutoFuzz and PULSAR, which are based on traffic analysis for automated state model inference, Prospex [27] tried to use dynamic taint analysis to infer the protocol state model and message format, while PRETT [28] used binary tokens combined with network traces to build minimized state model. Besides, IJON [29] and FazzFactory [30] allowed users to annotate the specific variables in the program under test via provided APIs, using specific feedback to guide the fuzzer to perform domainspecific fuzzing. In addition to AFLNET, STATEAFL, etc.…”
Section: Program State Model Inferencementioning
confidence: 99%
See 1 more Smart Citation
“…In addition to AutoFuzz and PULSAR, which are based on traffic analysis for automated state model inference, Prospex [27] tried to use dynamic taint analysis to infer the protocol state model and message format, while PRETT [28] used binary tokens combined with network traces to build minimized state model. Besides, IJON [29] and FazzFactory [30] allowed users to annotate the specific variables in the program under test via provided APIs, using specific feedback to guide the fuzzer to perform domainspecific fuzzing. In addition to AFLNET, STATEAFL, etc.…”
Section: Program State Model Inferencementioning
confidence: 99%
“…Inspired by IJON [29], etc. [30], we plan to introduce an annotation mechanism into NSFuzz as a supplement to the proposed static analyzer. We will design several APIs to help users annotate state variables and synchronization points manually in the SUT, which is expected to improve the applicability and scalability of NSFuzz.…”
Section: Future Workmentioning
confidence: 99%
“…These approaches are not adept at exposing complex vulnerabilities such as buffer overruns that get exhibited only in runs that reach vulnerability locations with certain specific vulnerabilityinducing program states. FuzzFactory [9] is a framework for instantiating a fuzzer with domain-specific testing objectives. However, their approach does not focus on detecting vulnerabilities, and does not have the notion of how close a test run comes to exposing a vulnerability.…”
Section: Related Workmentioning
confidence: 99%
“…Fuzzing [44]- [46] is another technique that generates new test cases by providing new random inputs to a program. Unfortunately, existing fuzzing tools for JavaScript are limited due to the dynamic typing used in JavaScript.…”
Section: Related Workmentioning
confidence: 99%