Automated Whitebox Fuzz Testing. Patrice Godefroid; Michael Levin; David Molnar.
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs and test the program on the resulting values. We present an alternative whitebox fuzz testing approach inspired by recent advances in symbolic execution and dynamic test generation. Our approach records an actual run of a program under test on a well-formed input, symbolically evaluates the recorded trace, and generates constraints capturing how the program uses its inputs. The generated constraints are used to produce new inputs which cause the program to follow different control paths. This process is repeated with the help of a code-coverage maximizing heuristic designed to find defects as fast as possible. We have implemented this algorithm in SAGE (Scalable, Automated, Guided Execution), a new tool employing x86 instruction-level tracing and emulation for whitebox fuzzing of arbitrary file-reading Windows applications.
I wonder how moving this type of system to the level of high-level programming language would impact its effectiveness.
Recent comments
5 weeks 1 day ago
5 weeks 2 days ago
5 weeks 3 days ago
5 weeks 3 days ago
6 weeks 1 day ago
6 weeks 1 day ago
6 weeks 1 day ago
9 weeks 2 days ago
10 weeks 20 hours ago
10 weeks 1 day ago