期刊文献+

面向二进制程序的导向性模糊测试方法 被引量:2

Directed fuzzing method for binary programs
下载PDF
导出
摘要 为了解决当前模糊测试技术中变异存在一定的盲目性以及变异生成的样本大多经过相同的高频路径的问题,提出并实现了一种基于轻量级程序分析技术的二进制程序模糊测试方法。首先对目标二进制程序进行静态分析来筛选在模糊测试过程中阻碍样本文件深入程序内部的比较指令;随后对目标文件进行插桩来获取比较指令中操作数的具体值,并根据该具体值为比较指令建立实时的比较进度信息,通过比较进度衡量样本的重要程度;然后基于模糊测试过程中实时的路径覆盖信息为经过稀有路径的样本增加其被挑选进行变异的概率;最后根据比较进度信息并结合启发式策略有针对性地对样本文件进行变异,通过变异引导提高模糊测试中生成能够绕过程序规约检查的有效样本的效率。实验结果表明,所提方法发现crash及发现新路径的能力均优于模糊测试工具AFL-Dyninst。 In order to address the problem that the mutation in the current fuzzing has certain blindness and the samples generated by the mutation mostly pass through the same high-frequency paths, a binary fuzzing method based on light-weight program analysis technology was proposed and implemented. Firstly, the target binary program was statically analyzed to filter out the comparison instructions which hinder the sample files from penetrating deeply into the program during the fuzzing process. Secondly, the target binary program was instrumented to obtain the specific values of the operands in the comparison instructions, according to which the real-time comparison progress information for each comparison instruction was established, and the importance of each sample was measured according to the comparison progress information. Thirdly, the real-time path coverage information in the fuzzing process was used to increase the probability that the samples passing through rare paths were selected to be mutated. Finally, the input files were directed and mutated by the comparison progress information combining with a heuristic strategy to improve the efficiency of generating valid inputs that could bypass the comparison checks in the program. The experimental results show that the proposed method is better than the current binary fuzzing tool AFL-Dyninst both in finding crashes and discovering new paths.
作者 张瀚方 周安民 贾鹏 刘露平 刘亮 ZHANG Hanfang;ZHOU Anmin;JIA Peng;LIU Luping;LIU Liang(College of Cybersecurity, Sichuan University, Chengdu Sichuan 610065, China;College of Electronics and Information Engneering, Sichuan University, Chengdu Sichuan 610065, China)
出处 《计算机应用》 CSCD 北大核心 2019年第5期1389-1393,共5页 journal of Computer Applications
基金 国家重点研发计划项目(2017YFB0802900) CCF-启明星辰"鸿雁"科研资助计划项目(CCF-VenustechRP2017002)~~
关键词 导向性模糊测试 反馈式模糊测试 二进制模糊测试 程序插桩 漏洞挖掘 directed fuzzing feedback fuzzing binary fuzzing program instrumentation vulnerability mining
  • 相关文献

参考文献1

二级参考文献11

  • 1SUTTON Michael.模糊测试:强制性安全漏洞发掘[M].北京:机械工业出版社,2009.
  • 2SCHWARTZ E J,AVGERINOS T,BRUMLEY D. All you everwanted to know about dynamic taint analysis and forward sym.bolic execution(but might have been afraid to ask)[C]// 2010IEEE Symposium on Security and Privacy(SP). [S.l.]:IEEE,2010:317.331.
  • 3LIN Z,JIANG X,XU D,et al. Automatic protocol format re.verse engineering through context . aware monitored execution[J]. NDSS,2008,8:1.15.
  • 4LIN Z,ZHANG X,XU D. Reverse engineering input syntacticstructure from program execution and its applications [J]. IEEETransactions on Software Engineering,2010,36(5):688.703.
  • 5CABALLERO J,YIN H,LIANG Z,et al. Polyglot:Automaticextraction of protocol message format using dynamic binary anal.ysis [C]// Proceedings of the 14th ACM conference on Computerand Communications Security. [S.l.]:ACM,2007:317.329.
  • 6KANER C,BOND W P. Software engineering metrics:Whatdo they measure and how do we know [J]. Methodology,2004,8:6.18.
  • 7MCCABE T J. A complexity measure [J]. IEEE Transactions onSoftware Engineering,1976(4):308.320.
  • 8HATTON L. The role of empiricism in improving the reliabili.ty of future software [J/OL]. [2012.08.29]. http://www.comput.er.org/csdl/.
  • 9SONG D,BRUMLEY D,YIN H,et al. BitBlaze:A new ap.proach to computer security via binary analysis [J]. Informa.tion Systems Security:Lecture Notes in Computer Science,2008,5352:1.25.
  • 10YIN H,SONG D. Temu:Binary code analysis via whole.sys.tem layered annotative execution,UCB/EECS . 2010 . 3 [R].Berkeley:EECS Department,University of California,2010.

共引文献1

同被引文献30

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部