期刊文献+

距离与权重相结合的导向式灰盒模糊测试方法 被引量:1

Guided Grey-Box Fuzzing Test Method Combining Distance and Weight
在线阅读 下载PDF
导出
摘要 导向式灰盒模糊测试是一种能够快速对程序指定位置进行测试的技术。通过对当前导向式灰盒模糊测试技术导向不够精确的问题进行分析,提出一种新的导向式灰盒模糊测试方法,并引入基本块权重与函数路径长度的概念。通过对被测程序的静态分析,构建被测程序的函数调用图和控制流程图,计算更准确的基本块距离并插桩到被测程序中。在模糊测试时通过插桩追踪并计算每个测试用例到指定目标的距离,模糊测试器依据该距离计算种子能量以实现对目标区域的导向,并基于该方法实现原型系统Afl-guide。实验结果表明,与现有的导向式模糊测试方法相比,该方法对目标区域导向更精确、路径覆盖更广,能够更快地生成覆盖程序指定位置的测试用例。 Guided grey-box fuzzing test is a technique that can quickly test a specified location of a program.By analyzing the problem that the existing guided grey-box fuzzing test techniques are not accurate enough in guidance,this paper proposes a guided grey-box fuzzing test method.The method introduces the concepts of basic block weight and function path length.Through the static analysis of the program under test,the function call graph and control flow chart of the program under test are constructed,and the more accurate basic block distance is calculated and inserted into the program.By instrumentation,the distance from each test case to the specified target is tracked and calculated in the fuzzing test.The fuzzing tester calculates the seed energy based on this distance to achieve the guidance of the target area.Based on this method,the prototype system Afl-guide is implemented.The experimental results show that compared with the existing guided fuzzing test methods,the proposed method is more accurate in the guidance of the target area,provides wider path coverage,and can generate test cases covering the specified position of the program faster.
作者 李明磊 陆余良 黄晖 朱凯龙 LI Minglei;LU Yuliang;HUANG Hui;ZHU Kailong(College of Electronic Engineering,National University of Defense Technology,Hefei 230037,China)
出处 《计算机工程》 CAS CSCD 北大核心 2021年第3期147-154,共8页 Computer Engineering
基金 国家重点研发计划“网络空间安全”重点专项(2017YFB0802900)。
关键词 灰盒模糊测试 距离向量 基本块 种子能量分配 漏洞检测 grey-box fuzzing test distance vector basic block seed energy allocation vulnerability detection
  • 相关文献

参考文献5

二级参考文献26

  • 1夏一民,罗军,张民选.基于静态分析的安全漏洞检测技术研究[J].计算机科学,2006,33(10):279-282. 被引量:30
  • 2Oehlert P. Violating Assumptions with Fuzzing[J]. IEEE Security & Privacy, 2005, 3(2): 58-62.
  • 3Molnar D, Wagner D. Catchconv: Symbolic Execution and Runtime Type Inference for Integer Conversion Errors[Z]. [S. l.]: UC Berkeley EECS, 2007.
  • 4Godefroid P, Levin M, Molnar D. Automated Whitebox Fuzz Testing[Z]. [S. l.]: Microsoft Research, 2007.
  • 5King J C. Symbolic Execution and Program Testing[J]. Journal of the ACM, 1976, 19(7): 385-394.
  • 6Newsome J. Dynamic Taint Analysis: Automatic Detection, Analysis and Signature Generation of Exploit Attacks on Commodity Software[C]//Proceedings of the 12th Annual Network and Distributed System Security Symposium. San Diego, California, USA: [s. n.], 2005.
  • 7Weber S, Karger P A, Paradkar A. A Software Flaw Taxonomy: Aiming Tools at Security[C]//Proc. of ACM Software Engineering for Secure Systems Building Trustworthy Applications. Louis, Missouri, USA: [s. n.], 2005.
  • 8Landwehr C E. Formal Models for Computer Security[J]. ACM Computing Surveys, 1981, 13(3): 247-278.
  • 9Foster J S, Fghndrich M, Aiken A. A Theory of Type Qualifiers[J]. ACM SIGPLAN Notices, 1999, 34(5): 192-203.
  • 10Kurshan R P. Program Verification[J]. Notices of the American Mathematical Society, 2000, 47(5): 534-545.

共引文献104

同被引文献2

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部