Coverage-based Greybox Fuzzing As Markov Chain
Title | Coverage-based Greybox Fuzzing As Markov Chain |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Böhme, Marcel, Pham, Van-Thuan, Roychoudhury, Abhik |
Conference Name | Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-4139-4 |
Keywords | Foundations, fuzzing, Metrics, pubcrawl, Resiliency, Scalability, security, software security, testing efficiency, Time Frequency Analysis, vulnerability detection |
Abstract | Coverage-based Greybox Fuzzing (CGF) is a random testing approach that requires no program analysis. A new test is generated by slightly mutating a seed input. If the test exercises a new and interesting path, it is added to the set of seeds; otherwise, it is discarded. We observe that most tests exercise the same few "high-frequency" paths and develop strategies to explore significantly more paths with the same number of tests by gravitating towards low-frequency paths. We explain the challenges and opportunities of CGF using a Markov chain model which specifies the probability that fuzzing the seed that exercises path i generates an input that exercises path j. Each state (i.e., seed) has an energy that specifies the number of inputs to be generated from that seed. We show that CGF is considerably more efficient if energy is inversely proportional to the density of the stationary distribution and increases monotonically every time that seed is chosen. Energy is controlled with a power schedule. We implemented the exponential schedule by extending AFL. In 24 hours, AFLFAST exposes 3 previously unreported CVEs that are not exposed by AFL and exposes 6 previously unreported CVEs 7x faster than AFL. AFLFAST produces at least an order of magnitude more unique crashes than AFL. |
URL | http://doi.acm.org/10.1145/2976749.2978428 |
DOI | 10.1145/2976749.2978428 |
Citation Key | bohme_coverage-based_2016 |