Fuzzing for Stateful Protocol Programs Based on Constraints between States and Message Types
Stateful protocol programs are a critical component of the network systems, and vulnerabilities in these programs can lead to severe consequences. Fuzzing, as an effective testing technique, has proven to be a powerful method for discovering vulnerabilities in stateful protocol programs, thereby enhancing their reliability and security. However, current stateful protocol fuzzers often rely on randomly mutating both the content and sequence of messages, leading to two major limitations. First, constraints between states and message types impose restrictions on the valid ordering of message types. Completely random sequence mutation frequently results in test cases that are partially valid but largely discarded by the program. Second, existing methods struggle to generate new message types that do not appear in the initial seed corpus. To overcome these limitations, we propose a stateful protocol fuzzing approach that leverages constraints between states and message types. We implement this approach in a prototype tool called STCFuzz. STCFuzz begins by identifying states, message types, and their associated constraints in the program code through static analysis. It then leverages this information to perform constraint-based sequence mutation to generate more effective test cases. Additionally, STCFuzz utilizes large language models to generate new message types absent from the original seed corpus. We conduct comparative experiments between STCFuzz and other state-of-the-art fuzzers. Experimental results demonstrate that STCFuzz achieves an average improvement of 13.4% in state transition coverage and 7.7% in code coverage compared to other fuzzers. Furthermore, STCFuzz triggers more crashes and discovers more vulnerabilities, highlighting its effectiveness in uncovering security flaws.
Sat 21 JunDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
14:00 - 15:30 | Session5: Software Vulnerability and Security IINew Idea Track / Research Track at Cosmos 3A Chair(s): Chuanyi Li Nanjing University | ||
14:00 15mTalk | Devmp: A Virtual Instruction Extraction Method for Commercial Code Virtualization Obfuscators Research Track Shenqianqian Zhang Key Laboratory of Cyberspace Security, Ministry of Education, Weiyu Dong Information Engineering University, Jian Lin Information Engineering University | ||
14:15 15mTalk | Line-level Semantic Structure Learning for Code Vulnerability Detection Research Track Ziliang Wang Peking University, Ge Li Peking University, Jia Li Tsinghua University, Yihong Dong Peking University, Yingfei Xiong Peking University, Zhi Jin Peking University | ||
14:30 15mTalk | SLVHound: Static Detection of Session Lingering Vulnerabilities in Modern Java Web Applications Research Track Haining Meng SKLP, Institute of Computing Technology, CAS, China; University of Chinese Academy of Sciences, China, Jie Lu SKLP, Institute of Computing Technology, CAS, China; University of Chinese Academy of Sciences, China, Yongheng Huang Institute of Computing Technology at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Lian Li Institute of Computing Technology at Chinese Academy of Sciences; University of Chinese Academy of Sciences | ||
14:45 15mTalk | Def-VAE: Identifying Adversarial Inputs with Robust Latent Representations Research Track Chengye Li Institute of Software, Chinese Academy of Sciences, Changshun Wu Université Grenoble Alpes, Rongjie Yan Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences | ||
15:00 15mTalk | Fuzzing for Stateful Protocol Programs Based on Constraints between States and Message Types Research Track Kunpeng Jian Institute of Information Engineering, Chinese Academy of Sciences, Yanyan Zou Institute of Information Engineering, Chinese Academy of Sciences, Menghao Li Institute of Information Engineering, Chinese Academy of Sciences, Wei Huo Institute of Information Engineering at Chinese Academy of Sciences | ||
15:15 10mTalk | PriceSleuth: Detecting DeFi Price Manipulation Attacks in Smart Contracts Using LLM and Static Analysis New Idea Track Hao Wu Xi'an JiaoTong University, Haijun Wang Xi'an Jiaotong University, Shangwang Li Xi'an Jiaotong University, Yin Wu Xi'an Jiaotong University, Ming Fan Xi'an Jiaotong University, Yitao Zhao Yunnan Power Grid Co., Ltd, Ting Liu Xi'an Jiaotong University Pre-print |
Cosmos 3A is the first room in the Cosmos 3 wing.
When facing the main Cosmos Hall, access to the Cosmos 3 wing is on the left, close to the stairs. The area is accessed through a large door with the number “3”, which will stay open during the event.