ProFuzzer: On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery
Remarks
Conference: S&P 2019
Full Paper: https://youwei1988.github.io/papers/SP2019.pdf
Slides: https://www.inforsec.org/wp/wp-content/uploads/2020/01/%E6%B8%B8%E4%BC%9F-ProFuzzer-Wei-You.pdf
POC: https://github.com/profuzzer
Abstract
Existing mutation based fuzzers tend to randomly mutate the input of a program without understanding its underlying syntax and semantics. In this paper, we propose a novel on-the-fly probing technique (called ProFuzzer) that automatically recovers and understands input fields of critical importance to vulnerability discovery during a fuzzing process and intelligently adapts the mutation strategy to enhance the chance of hitting zero-day targets. Since such probing is transparently piggybacked to the regular fuzzing, no prior knowledge of the input specification is needed. During fuzzing, individual bytes are first mutated and their fuzzing results are automatically analyzed to link those related together and identify the type for the field connecting them; these bytes are further mutated together following type-specific strategies, which substantially prunes the search space. We define the probe types generally across all applications, thereby making our technique application agnostic. Our experiments on standard benchmarks and real-world applications show that ProFuzzer substantia
ProFuzzer: 智能漏洞挖掘

ProFuzzer是一种新型模糊测试技术,通过在线探测输入字段和语义,智能调整突变策略,显著提升了零日漏洞的发现效率。在两个月内,成功发现了42个未知漏洞,其中30个获CVE认证。
最低0.47元/天 解锁文章
1万+

被折叠的 条评论
为什么被折叠?



