A Smart Fuzzer for x86 Executables

  • Authors:
  • Andrea Lanzi;Lorenzo Martignoni;Mattia Monga;Roberto Paleari

  • Affiliations:
  • Universita degli Studi di Milano, Italy;Universita degli Studi di Milano, Italy;Universita degli Studi di Milano, Italy;Universita degli Studi di Milano, Italy

  • Venue:
  • SESS '07 Proceedings of the Third International Workshop on Software Engineering for Secure Systems
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

The automatic identification of security-relevant flaws in binary executables is still a young but promising research area. In this paper, we describe a new approach for the identification of vulnerabilities in object code we called smart fuzzing. While conventional fuzzing uses random input to discover crash conditions, smart fuzzing restricts the input space by using a preliminary static analysis of the program, then refined by monitoring each execution. In other words, the search is driven by a mix of static and dynamic analysis in order to lead the execution path to selected corner cases that are the most likely to expose vulnerabilities, thus improving the effectiveness of fuzzing as a means for finding security breaches in black-box programs.