Write a Blog >>
Mon 10 Oct 2022 10:00 - 10:30 at Gold B - Poster Session

C has been regarded as a dominant programming language for system software implementation. Meanwhile, it often suffers from various memory vulnerabilities due to its low-level memory control. Quite massive approaches are proposed to enhance memory security, among which Coverage-based Greybox Fuzzing (CGF) is considered to be effective because of its practicality and satisfactory vulnerability detection ability. However, CGF identifies vulnerability based on the verification of detected crashes, thus cannot detect vulnerabilities with non-crash. In this paper, we consider to trace pointer metadata (status, bounds and referents) to detect more various vulnerabilities. Additionally, since pointers in C are often directly related to memory operations, we design two standards to further use pointer metadata as the guidance of CGF, make fuzzing process target to the vulnerable part of programs.

Mon 10 Oct

Displayed time zone: Eastern Time (US & Canada) change

10:00 - 10:30
Poster SessionDoctoral Symposium at Gold B
10:00
30m
Doctoral symposium paper
Call Graph Evolution Analytics over a Version Series of an Evolving Software SystemVirtual
Doctoral Symposium
Animesh Chaturvedi Indian Institute of Information Technology Dharwad (IIIT Dharwad)
DOI Pre-print Media Attached
10:00
30m
Doctoral symposium paper
Coverage-based Greybox Fuzzing with Pointer Monitoring for C ProgramsVirtual
Doctoral Symposium
Haibo Chen School of Computer Science and Communication Engineering, Jiangsu University, Jinfu Chen Jiangsu University