A hybrid symbolic execution assisted fuzzing method

L Zhang, VLL Thing - TENCON 2017-2017 IEEE Region 10 …, 2017 - ieeexplore.ieee.org
L Zhang, VLL Thing
TENCON 2017-2017 IEEE Region 10 Conference, 2017ieeexplore.ieee.org
We present a new automated method for efficient detection of security vulnerabilities in
binary programs. This method starts with a bounded symbolic execution of the target
program so as to explore as many paths as possible. Constraints of the explored paths are
collected and solved for inputs. The inputs will then be fed to the following interleaved
coverage-based fuzzing and concolic execution. As the paths explored by the bounded
symbolic execution may cover some unique paths that can be rarely reached by random …
We present a new automated method for efficient detection of security vulnerabilities in binary programs. This method starts with a bounded symbolic execution of the target program so as to explore as many paths as possible. Constraints of the explored paths are collected and solved for inputs. The inputs will then be fed to the following interleaved coverage-based fuzzing and concolic execution. As the paths explored by the bounded symbolic execution may cover some unique paths that can be rarely reached by random testing featured fuzzing and locality featured concolic execution, the efficiency and effectiveness of the overall exploration can be greatly enhanced. In particular, the bounded symbolic execution can effectively prevent the fuzzing guided exploration from converging to the less interesting but easy-to-fuzz branches.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果