Visible to the public Coverage-based Greybox Fuzzing As Markov Chain

TitleCoverage-based Greybox Fuzzing As Markov Chain
Publication TypeConference Paper
Year of Publication2016
AuthorsBöhme, Marcel, Pham, Van-Thuan, Roychoudhury, Abhik
Conference NameProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4139-4
KeywordsFoundations, fuzzing, Metrics, pubcrawl, Resiliency, Scalability, security, software security, testing efficiency, Time Frequency Analysis, vulnerability detection
Abstract

Coverage-based Greybox Fuzzing (CGF) is a random testing approach that requires no program analysis. A new test is generated by slightly mutating a seed input. If the test exercises a new and interesting path, it is added to the set of seeds; otherwise, it is discarded. We observe that most tests exercise the same few "high-frequency" paths and develop strategies to explore significantly more paths with the same number of tests by gravitating towards low-frequency paths. We explain the challenges and opportunities of CGF using a Markov chain model which specifies the probability that fuzzing the seed that exercises path i generates an input that exercises path j. Each state (i.e., seed) has an energy that specifies the number of inputs to be generated from that seed. We show that CGF is considerably more efficient if energy is inversely proportional to the density of the stationary distribution and increases monotonically every time that seed is chosen. Energy is controlled with a power schedule. We implemented the exponential schedule by extending AFL. In 24 hours, AFLFAST exposes 3 previously unreported CVEs that are not exposed by AFL and exposes 6 previously unreported CVEs 7x faster than AFL. AFLFAST produces at least an order of magnitude more unique crashes than AFL.

URLhttp://doi.acm.org/10.1145/2976749.2978428
DOI10.1145/2976749.2978428
Citation Keybohme_coverage-based_2016