Coverage-based Greybox Fuzzing with Pointer Monitoring for C ProgramsVirtual
C has been regarded as a dominant programming language for system software implementation. Meanwhile, it often suffers from various memory vulnerabilities due to its low-level memory control. Quite massive approaches are proposed to enhance memory security, among which Coverage-based Greybox Fuzzing (CGF) is considered to be effective because of its practicality and satisfactory vulnerability detection ability. However, CGF identifies vulnerability based on the verification of detected crashes, thus cannot detect vulnerabilities with non-crash. In this paper, we consider to trace pointer metadata (status, bounds and referents) to detect more various vulnerabilities. Additionally, since pointers in C are often directly related to memory operations, we design two standards to further use pointer metadata as the guidance of CGF, make fuzzing process target to the vulnerable part of programs.
Mon 10 OctDisplayed time zone: Eastern Time (US & Canada) change
10:00 - 10:30 | |||
10:00 30mDoctoral symposium paper | Call Graph Evolution Analytics over a Version Series of an Evolving Software SystemVirtual Doctoral Symposium Animesh Chaturvedi Indian Institute of Information Technology Dharwad (IIIT Dharwad) DOI Pre-print Media Attached | ||
10:00 30mDoctoral symposium paper | Coverage-based Greybox Fuzzing with Pointer Monitoring for C ProgramsVirtual Doctoral Symposium Haibo Chen School of Computer Science and Communication Engineering, Jiangsu University, Jinfu Chen Jiangsu University |