2019 IEEE Symposium on Security and Privacy (SP) 2019
DOI: 10.1109/sp.2019.00057
|View full text |Cite
|
Sign up to set email alerts
|

ProFuzzer: On-the-fly Input Type Probing for Better Zero-Day Vulnerability Discovery

Abstract: Existing mutation based fuzzers tend to randomly mutate the input of a program without understanding its underlying syntax and semantics. In this paper, we propose a novel onthe-fly probing technique (called ProFuzzer) that automatically recovers and understands input fields of critical importance to vulnerability discovery during a fuzzing process and intelligently adapts the mutation strategy to enhance the chance of hitting zero-day targets. Since such probing is transparently piggybacked to the regular fuz… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
58
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 92 publications
(70 citation statements)
references
References 26 publications
0
58
0
Order By: Relevance
“…Generally, input mutation can also be viewed as input prioritization: if we see the input space as all the combinations of bytes, then input mutation prioritizes a subset of inputs from the input space by mutation. Previous work design comprehensive mutation strategies [12,26,31,58] and optimal mutation scheduling approaches [36]. These input mutation approaches are all complementary to our proposed input prioritization scheme.…”
Section: Input Mutation and Energy Assignmentmentioning
confidence: 99%
See 1 more Smart Citation
“…Generally, input mutation can also be viewed as input prioritization: if we see the input space as all the combinations of bytes, then input mutation prioritizes a subset of inputs from the input space by mutation. Previous work design comprehensive mutation strategies [12,26,31,58] and optimal mutation scheduling approaches [36]. These input mutation approaches are all complementary to our proposed input prioritization scheme.…”
Section: Input Mutation and Energy Assignmentmentioning
confidence: 99%
“…Wang et al [53] apply the address rather than the count of memory access. Type-aware fuzzers such as Angora [12], TIFF [26], and ProFuzzer [58] identify inputs that associated to specific memory operations and mutate towards targeted programs or patterns, but they cause higher overhead due to type inference, and that input mutation is separate from input prioritization in our context that could be complementary to our approach.…”
Section: Coverage Accountingmentioning
confidence: 99%
“…Many tools [8], [12], [14], [29], [20], [13], [30] apply various techniques to boost the fuzzing process. AFLFast, AFLGo, CollAFL, and VUzzer focus on improving the seed selection.…”
Section: Mutation-based Fuzzingmentioning
confidence: 99%
“…It also uses taint analysis to help mutate seeds. FairFuzz [13], ProFuzzer [30], and MOPT [15] focus on improving the seed mutation. FairFuzz only mutates seeds which hit rare branches and it strives to ensure the mutant seeds still hit the rarest ones.…”
Section: Mutation-based Fuzzingmentioning
confidence: 99%
“…This is based on the intuition that most inputs generated by the fuzzers are invalid inputs which will Chapter 2. Related Work [9] AFLGo [12] FairFuzz [13] Vuzzer [14] Angora [15] CollAFL [16] Hawkeye [1] Slowfuzz [17] Perffuzz [18] Driller [19] Qsym [20] Redqueen [21] Mopt [22] Savior [23] Zest [24] GRIMOIRE [25] Superion [26] Profuzzer [27] [28] [29] UnTracer [30] be rejected by the tested program before executing the main processing logic. Thus, the frequently visited branches are more likely to be shallow code which is bug-free, increasing the importance of seed inputs which execute low frequency branches.…”
Section: Seed Selection and Power Schedulingmentioning
confidence: 99%