A Fuzzing System Based on Program Tracing and Mixed Execution

A fuzzing and hybrid execution technology, applied in the field of information security, can solve the problems of unique identification conflict collision, error, low efficiency of constraint solving, etc., and achieve the effect of simplifying path constraints, improving effectiveness, improving efficiency and vulnerability discovery ability

Active Publication Date: 2020-07-10
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this method is more efficient for source code testing, it has the possibility of conflicts and collisions for the unique identification of basic blocks, and it also lacks support for binary programs
[0015] (2) Although some fuzzing tools can test binary programs, they generally lack a feedback mechanism, which makes the testing efficiency low; even if a few fuzzing tools use a feedback mechanism, such as AFL's QEMU mode (referred to as Q-AFL), However, due to the need to simulate and track instructions, on the one hand, it is difficult for the simulator to fully and correctly simulate the target instructions, which may cause errors during the simulation execution of the target binary program; on the other hand, operations such as stub insertion or instruction conversion during simulation execution greatly affect It affects the performance of the target binary program, resulting in poor test results, and it is difficult to achieve satisfactory test results in practical applications
[0016] (3) Some mainstream fuzzing tools use symbolic execution, taint analysis and other technologies to assist in testing to improve the pertinence of testing, thereby improving the efficiency of fuzzing to a certain extent, but these technologies have their own limitations, such as symbolic execution technology. Problems such as path explosion, low constraint solving efficiency, and difficulty in extending to large-scale programs limit the improvement of fuzz testing effect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Fuzzing System Based on Program Tracing and Mixed Execution

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The present invention will be described in detail below in conjunction with the accompanying drawings and specific examples.

[0053] In the present invention, the artificially provided test case is called the initial test case, the test case provided to the fuzzing module for mutation is called the seed test case, and the test case directly generated through the subsequent mutation on the basis of the seed test case and the mixed The test cases generated by the execution module are called candidate test cases, and the candidate test cases that have been screened and saved in the test case set are called test cases.

[0054] The embodiment of the present invention is a fuzz testing system based on program tracking and mixed execution, which mainly includes three modules (such as figure 1 shown), which are the fuzzing module, the data flow tracking module and the hybrid execution module respectively, where the input of the fuzzing module is the target binary program, the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a fuzzy test system based on program tracking and hybrid execution, and the system mainly comprises three modules: a fuzzy test module, a data flow tracking module, and a hybridexecution module. Wherein the input of the fuzzy test module is a target binary program, the type information of variables corresponding to byte sequences in a seed test case and the seed test case extracted by the data flow tracking module is output as a test case for triggering a new path; wherein the input of the data flow tracking module is a seed test case loaded by the target binary programand the fuzzy test module, and the output of the data flow tracking module is a dependency relationship between type information of variables corresponding to byte sequences in the seed test case anddata in the target binary program; wherein the input of the hybrid execution module is a dependency relationship of data in a target binary program provided by the data flow tracking module in real time, and the output of the hybrid execution module is a candidate test case which is newly generated by the module and can trigger a new path. Compared with the prior art, the system can improve the effectiveness of test case generation.

Description

technical field [0001] The invention belongs to the technical field of information security, in particular to a fuzz testing system based on program tracing and mixed execution. Background technique [0002] Fuzz testing: Fuzz testing is a method of discovering software vulnerabilities by providing unexpected inputs to the target system or software and monitoring abnormal results. Because fuzz testing technology can convert a large number of manual tests into highly automated tests, between black and white Between box testing and white box testing, it is widely used in the field of vulnerability mining at home and abroad. [0003] Test cases: The generation strategy of test cases determines the test efficiency of fuzz testing. Better test cases can cover more paths of the program to be tested, thereby detecting more program vulnerabilities. Fuzzing test case generation methods can be divided into two types, generation-based and mutation-based. The generation-based method m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/36
Inventor 田东海李斌斌王文杰马锐王雪霏王夏菁刘叔可蒋瑾曼
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products