CONFU: Configuration Fuzzing Testing Framework for Software Vulnerability Detection

  • Authors:
  • Huning Dai;Christian Murphy;Gail Kaiser

  • Affiliations:
  • Columbia University, USA;Columbia University, USA;Columbia University, USA

  • Venue:
  • International Journal of Secure Software Engineering
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Many software security vulnerabilities only reveal themselves under certain conditions, that is, particular configurations and inputs together with a certain runtime environment. One approach to detecting these vulnerabilities is fuzz testing. However, typical fuzz testing makes no guarantees regarding the syntactic and semantic validity of the input, or of how much of the input space will be explored. To address these problems, the authors present a new testing methodology called Configuration Fuzzing. Configuration Fuzzing is a technique whereby the configuration of the running application is mutated at certain execution points to check for vulnerabilities that only arise in certain conditions. As the application runs in the deployment environment, this testing technique continuously fuzzes the configuration and checks "security invariants'' that, if violated, indicate vulnerability. This paper discusses the approach and introduces a prototype framework called ConFu CONfiguration FUzzing testing framework for implementation. Additionally, the results of case studies that demonstrate the approach's feasibility are presented along with performance evaluations.