Full text

Turn on search term navigation

Copyright © 2024 Lixia Xie et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0/

Abstract

In response to the limitations of traditional fuzzing approaches that rely on static mutators and fail to dynamically adjust their test case mutations for deeper testing, resulting in the inability to generate targeted inputs to trigger vulnerabilities, this paper proposes a directed fuzzing methodology termed DocFuzz, which is predicated on a feedback mechanism mutator. Initially, a sanitizer is used to target the source code of the tested program and stake in code blocks that may have vulnerabilities. After this, a taint tracking module is used to associate the target code block with the bytes in the test case, forming a high-value byte set. Then, the reinforcement learning mutator of DocFuzz is used to mutate the high-value byte set, generating well-structured inputs that can cover the target code blocks. Finally, utilizing the feedback mechanism of DocFuzz, when the reinforcement learning mutator converges and ceases to optimize, the fuzzer is rebooted to continue mutating toward directions that are more likely to trigger vulnerabilities. Comparative experiments are conducted on multiple test sets, including LAVA-M, and the experimental results demonstrate that the proposed DocFuzz methodology surpasses other fuzzing techniques, offering a more precise, rapid, and effective means of detecting vulnerabilities in source code.

Details

Title
DocFuzz: A Directed Fuzzing Method Based on a Feedback Mechanism Mutator
Author
Xie, Lixia 1   VIAFID ORCID Logo  ; Zhao, Yuheng 1   VIAFID ORCID Logo  ; Yang, Hongyu 2   VIAFID ORCID Logo  ; Zhao, Ziwen 3   VIAFID ORCID Logo  ; Hu, Ze 3   VIAFID ORCID Logo  ; Zhang, Liang 4   VIAFID ORCID Logo  ; Cheng, Xiang 5   VIAFID ORCID Logo 

 School of Computer Science and Technology Civil Aviation University of China Tianjin 300300 China 
 School of Computer Science and Technology Civil Aviation University of China Tianjin 300300 China; School of Safety Science and Engineering Civil Aviation University of China Tianjin 300300 China 
 School of Safety Science and Engineering Civil Aviation University of China Tianjin 300300 China 
 School of Information The University of Arizona Tucson 85721 Arizona, USA 
 School of Information Engineering Yangzhou University Yangzhou 225127 China; Key Laboratory of Civil Aviation Flight Networking Civil Aviation University of China Tianjin 300300 China 
Editor
Yu-an Tan
Publication year
2024
Publication date
2024
Publisher
John Wiley & Sons, Inc.
ISSN
08848173
e-ISSN
1098111X
Source type
Scholarly Journal
Language of publication
English
ProQuest document ID
3148030426
Copyright
Copyright © 2024 Lixia Xie et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0/