Fuzzing the out-of-memory killer on embedded Linux: an adaptive random approach

  • Authors:
  • K. Y. Sim;F.-C. Kuo;R. Merkel

  • Affiliations:
  • Swinburne University of Technology (Sarawak Campus), Jalan Simpang Tiga, Kuching, Sarawak, Malaysia;Swinburne University of Technology, Victoria, Australia;Swinburne University of Technology, Victoria, Australia

  • Venue:
  • Proceedings of the 2011 ACM Symposium on Applied Computing
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Fuzzing is an automated black-box testing technique conducted with a destructive aim to crash (that is, to reveal failures in) the software under test. In this paper, we propose an adaptive random approach to fuzz the Out-Of-Memory (OOM) Killer on an embedded Linux distribution. The fuzzing process has revealed OOM Killer failures that cause the Linux kernel to remain in the OOM condition and become non-responsive. We have also found that the OOM Killer failures are more likely to occur when the Linux kernel has a higher over-commitment of memory requests. Finally, we have shown that the proposed adaptive random approach for fuzzing can reveal an OOM Killer failure with significantly fewer test inputs compared to the pure random approach.