Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ Archivio della ricer...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
ZENODO
Conference object . 2024
License: CC BY
Data sources: ZENODO
https://doi.org/10.14722/ndss....
Article . 2024 . Peer-reviewed
Data sources: Crossref
DBLP
Conference object . 2024
Data sources: DBLP
versions View all 6 versions
addClaim

Predictive Context-sensitive Fuzzing

Authors: Pietro Borrello; Andrea Fioraldi; Daniele Cono D’Elia; Davide Balzarotti; Leonardo Querzoni; Cristiano Giuffrida;

Predictive Context-sensitive Fuzzing

Abstract

Coverage-guided fuzzers expose bugs by progres-sively mutating testcases to drive execution to new programlocations. Code coverage is currently the most effective andpopular exploration feedback. For several bugs, though, also howexecution reaches a buggy program location may matter: forthose, only tracking what code a testcase exercises may leadfuzzers to overlook interesting program states. Unfortunately,context-sensitive coverage tracking comes with an inherent stateexplosion problem. Existing attempts to implement context-sensitive coverage-guided fuzzers struggle with it, experiencingnon-trivial issues for precision (due to coverage collisions) andperformance (due to context tracking and queue/map explosion).In this paper, we show that a much more effective approachto context-sensitive fuzzing is possible. First, we propose functioncloning as a backward-compatible instrumentation primitiveto enable precise (i.e., collision-free) context-sensitive coveragetracking. Then, to tame the state explosion problem, we argue toaccount for contextual information only when a fuzzer explorescontexts selected as promising. We propose a prediction schemeto identify one pool of such contexts: we analyze the data-flowdiversity of the incoming argument values at call sites, exposingto the fuzzer a contextually refined clone of the callee if the lattersees incoming abstract objects that its uses at other sites do not.Our work shows that, by applying function cloning to pro-gram regions that we predict to benefit from context-sensitivity,we can overcome the aforementioned issues while preserving,and even improving, fuzzing effectiveness. On the FuzzBenchsuite, our approach largely outperforms state-of-the-art coverage-guided fuzzing embodiments, unveiling more and different bugswithout incurring explosion or other apparent inefficiencies. Onthese heavily tested subjects, we also found 8 enduring securityissues in 5 of them, with 6 CVE identifiers issued.

Countries
Netherlands, Italy
Keywords

cybersecurity; software testing; fuzzy testing

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    3
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Top 10%
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
3
Top 10%
Average
Average
Green