首页 | 官方网站   微博 | 高级检索  
     

面向二进制程序的导向性模糊测试方法
引用本文:张瀚方,周安民,贾鹏,刘露平,刘亮.面向二进制程序的导向性模糊测试方法[J].计算机应用,2019,39(5):1389-1393.
作者姓名:张瀚方  周安民  贾鹏  刘露平  刘亮
作者单位:四川大学网络空间安全学院,成都,610065;四川大学电子信息学院,成都,610065
基金项目:国家重点研发计划项目(2017YFB0802900);CCF-启明星辰"鸿雁"科研资助计划项目(CCF-VenustechRP2017002)。
摘    要:为了解决当前模糊测试技术中变异存在一定的盲目性以及变异生成的样本大多经过相同的高频路径的问题,提出并实现了一种基于轻量级程序分析技术的二进制程序模糊测试方法。首先对目标二进制程序进行静态分析来筛选在模糊测试过程中阻碍样本文件深入程序内部的比较指令;随后对目标文件进行插桩来获取比较指令中操作数的具体值,并根据该具体值为比较指令建立实时的比较进度信息,通过比较进度衡量样本的重要程度;然后基于模糊测试过程中实时的路径覆盖信息为经过稀有路径的样本增加其被挑选进行变异的概率;最后根据比较进度信息并结合启发式策略有针对性地对样本文件进行变异,通过变异引导提高模糊测试中生成能够绕过程序规约检查的有效样本的效率。实验结果表明,所提方法发现crash及发现新路径的能力均优于模糊测试工具AFL-Dyninst。

关 键 词:导向性模糊测试  反馈式模糊测试  二进制模糊测试  程序插桩  漏洞挖掘
收稿时间:2018-10-31
修稿时间:2018-12-12

Directed fuzzing method for binary programs
ZHANG Hanfang,ZHOU Anmin,JIA Peng,LIU Luping,LIU Liang.Directed fuzzing method for binary programs[J].journal of Computer Applications,2019,39(5):1389-1393.
Authors:ZHANG Hanfang  ZHOU Anmin  JIA Peng  LIU Luping  LIU Liang
Affiliation:1. College of Cybersecurity, Sichuan University, Chengdu Sichuan 610065, China;2. College of Electronics and Information Engneering, Sichuan University, Chengdu Sichuan 610065, China
Abstract:In order to address the problem that the mutation in the current fuzzing has certain blindness and the samples generated by the mutation mostly pass through the same high-frequency paths, a binary fuzzing method based on light-weight program analysis technology was proposed and implemented. Firstly, the target binary program was statically analyzed to filter out the comparison instructions which hinder the sample files from penetrating deeply into the program during the fuzzing process. Secondly, the target binary program was instrumented to obtain the specific values of the operands in the comparison instructions, according to which the real-time comparison progress information for each comparison instruction was established, and the importance of each sample was measured according to the comparison progress information. Thirdly, the real-time path coverage information in the fuzzing process was used to increase the probability that the samples passing through rare paths were selected to be mutated. Finally, the input files were directed and mutated by the comparison progress information combining with a heuristic strategy to improve the efficiency of generating valid inputs that could bypass the comparison checks in the program. The experimental results show that the proposed method is better than the current binary fuzzing tool AFL-Dyninst both in finding crashes and discovering new paths.
Keywords:directed fuzzing                                                                                                                        feedback fuzzing                                                                                                                        binary fuzzing                                                                                                                        program instrumentation                                                                                                                        vulnerability mining
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号