Abstract
Directed gray-box fuzzing generates input samples with the objective of reaching a given set of target program locations efficiently so that improves the fuzzy efficiency and reduces the time cost. This Scheme can find well the vulnerabilities hided in update patch so that relies heavily on feature extraction of target blocks. Whether there are other basic blocks with similar features in the target program to speed up the efficiency of vulnerability fuzzing becomes the starting point of this paper. Our main work focuses on the static analysis of the target program to find feature similar blocks. We proposed a similarity feature discovery model of blocks by designing basic feature description vector of block. Standard feature extraction of malicious basic block from lava dataset by which we can quickly fuzz these basic blocks with similar characteristics and possibly potential threats in the target program. Through experiments, we find other basic blocks similar to malicious basic blocks and add them into dataset so that speed up the effectiveness of vulnerability fuzzing in directed gray-box fuzzing mode.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Arif, M.S., Raza, A., Shatanawi, W., et al.: A stochastic numerical analysis for computer virus model with vertical transmission over the internet. Comput. Mater. Continua 61(3), 1025–1043 (2019)
Tian, Z., Shi, W., Wang, Y., et al.: Real-time lateral movement detection based on evidence reasoning network for edge computing environment. IEEE Trans. Ind. Inf. 15(7), 4285–4294 (2019)
Yu, X., Tian, Z., Qiu, J., et al.: An intrusion detection algorithm based on feature graph. Comput. Mater. Continua 61(1), 255–274 (2019)
Zhao, W., Li, P., Zhu, C., et al.: Defense against poisoning attack via evaluating training samples using multiple spectral clustering aggregation method. Comput. Mater. Continua 59(3), 817–832 (2019)
Vulnerabilities by Date. https://www.cvedetails.com/browse-by-date.php. Accessed 22 Dec 2019
Vulnerabilities by Type. https://www.cvedetails.com/vulnerabilities-by-types.php. Accessed 22 Dec 2019
Toman, M.: LLVM IR service for Fedora, Masaryk University, USA (2013). https://is.muni.cz/th/n9bfn/dp.pdf. Accessed 22 Dec 2019
García-Ferreira, I., Laorden, C., Santos, I.: Static analysis: a brief survey. Logic J. IGPL 24(6), 871–882 (2016)
Zhou, M., et al.: A method for software vulnerability detection based on improved control flow graph. Wuhan Univ. J. Nat. Sci. 24(2), 149–160 (2019). https://doi.org/10.1007/s11859-019-1380-z
Feng, Z., Wang, Z., Dong, W., et al.: Bintaint: a static taint analysis method for binary vulnerability mining. In: International Conference on Cloud Computing, Big Data and Blockchain (ICCBB), Fuzhou, China, pp. 1–8. IEEE (2018)
Kim, J., Youn, J.M.: Malware behavior analysis using binary code tracking. In: International Conference on Computer Applications and Information Processing Technology (CAIPT), Kuta Bali, Indonesia, pp. 1–4. IEEE (2017)
Ghiasi, M., Sami, A., Salehi, Z.: Dynamic VSA: a framework for malware detection based on register contents. Eng. Appl. Artif. Intell. 44, 111–122 (2015)
Tian, D., Xiong, X., Changzhen, H., et al.: Defeating buffer overflow attacks via virtualization. Comput. Electr. Eng. 40(6), 1940–1950 (2014)
Feng, C., Zhang, X.: A static taint detection method for stack overflow vulnerabilities in binaries. In: International Conference on Information Science and Control Engineering (ICISCE), ChangSha, China, pp. 110–114. IEEE (2017)
Jeon, H.-G., Mok, S.-K., Cho, E.-S.: Automated crash filtering using interprocedural static analysis for binary codes. In: Annual Computer Software and Applications Conference (COMPSAC), Turin, Italy, pp. 614–623. IEEE (2017)
Liang, X., Cui, B., Lv, Y., et al.: Research on the collaborative analysis technology for source code and binary executable based upon the unified defect mode set. In: International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Blumenau, Brazil, pp. 260–264. IEEE (2015)
Alikhashashneh, E.A., Raje, R.R., Hill, J.H.: Using machine learning techniques to classify and predict static code analysis tool warnings. In: International Conference on Computer Systems and Applications (AICCSA), Aqaba, Jordan, pp. 1–8. IEEE (2018)
google/AFL. https://github.com/google/AFL. Accessed 23 Dec 2019
Chen, L., Yang, C., Liu, F., et al.: Automatic mining of security-sensitive functions from source code. Comput. Mater. Continua 56(2), 199–210 (2018)
Rawat, S., Jain, V., Kumar, A., et al.: Vuzzer: application-aware evolutionary fuzzing. In: The Network and Distributed System Security Symposium (NDSS), San Diego, California, pp. 1–14. Internet Society (2017)
Du, C., Tan, X., Guo, Y.: A gray-box vulnerability discovery model based on path coverage. In: Sun, X., Pan, Z., Bertino, E. (eds.) ICAIS 2019. LNCS, vol. 11635, pp. 3–12. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-24268-8_1
Böhme, M., Pham, V.-T., Roychoudhury, A.: Coverage-based greybox fuzzing as markov chain. In: ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austri, pp. 1032–1043. ACM (2016)
Böhme, M., Pham, V.-T., Nguyen, M.-D., et al.: Directed greybox fuzzing. In: ACM SIGSAC Conference on Computer and Communications Security (CCS), Dallas, USA, pp. 2329–2344. ACM (2017)
Chen, H., Xue, Y., Li, Y., et al.: Hawkeye: towards a desired directed grey-box fuzzer. In: The ACM SIGSAC Conference on Computer and Communications Security (CCS), Toronto, ON, Canada, pp. 2329–2344. ACM (2018)
Dolan-Gavitt, B., Hulin, P., Kirda, E., et al.: Lava: large-scale automated vulnerability addition. In: Symposium on Security and Privacy, San Jose, USA, pp. 110–121. IEEE (2016)
Panda-re/lava. https://github.com/panda-re/lava. Accessed 22 Dec 2019
Acknowledgement
This work was supported by Natural Science Foundation of China (61702013), Joint of Beijing Natural Science Foundation and Education Commission (KZ201810009011), Science and Technology Innovation Project of North China University of Technology (19XN108).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Du, C., Liu, S., Guo, Y., Si, L., Jin, T. (2020). Detection and Information Extraction of Similar Basic Blocks Used for Directed Greybox Fuzzing. In: Sun, X., Wang, J., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2020. Lecture Notes in Computer Science(), vol 12240. Springer, Cham. https://doi.org/10.1007/978-3-030-57881-7_32
Download citation
DOI: https://doi.org/10.1007/978-3-030-57881-7_32
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-57880-0
Online ISBN: 978-3-030-57881-7
eBook Packages: Computer ScienceComputer Science (R0)