4.6 Article

V-Fuzz: Vulnerability Prediction-Assisted Evolutionary Fuzzing for Binary Programs

Journal

IEEE TRANSACTIONS ON CYBERNETICS
Volume 52, Issue 5, Pages 3745-3756

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TCYB.2020.3013675

Keywords

Fuzzing; Computer bugs; Predictive models; Machine learning; Feature extraction; Software; Numerical models; Fuzz testing; graph embedding; vulnerability prediction

Funding

  1. NSFC [U1936215, U1836202, 61772466]
  2. National Key Research and Development Program of China [2018YFB0804102, 2020YFB1804705]
  3. Zhejiang Provincial Natural Science Foundation for Distinguished Young Scholars [LR19F020003]
  4. Zhejiang Provincial Key Research and Development Program [2019C01055, 2020C01021]
  5. Industrial Internet Innovation and Development Project [TC190A449]
  6. Major Scientific Project of Zhejiang Lab [2018FD0ZX01]

Ask authors/readers for more resources

This article introduces an evolutionary fuzzing framework called V-Fuzz, which efficiently identifies vulnerabilities in binary programs using a vulnerability prediction model and an evolutionary algorithm. Experimental results demonstrate that V-Fuzz is effective in finding bugs and has discovered new vulnerabilities.
Fuzzing is a technique of finding bugs by executing a target program recurrently with a large number of abnormal inputs. Most of the coverage-based fuzzers consider all parts of a program equally and pay too much attention to how to improve the code coverage. It is inefficient as the vulnerable code only takes a tiny fraction of the entire code. In this article, we design and implement an evolutionary fuzzing framework called V-Fuzz, which aims to find bugs efficiently and quickly in limited time for binary programs. V-Fuzz consists of two main components: 1) a vulnerability prediction model and 2) a vulnerability-oriented evolutionary fuzzer. Given a binary program to V-Fuzz, the vulnerability prediction model will give a prior estimation on which parts of a program are more likely to be vulnerable. Then, the fuzzer leverages an evolutionary algorithm to generate inputs which are more likely to arrive at the vulnerable locations, guided by the vulnerability prediction result. The experimental results demonstrate that V-Fuzz can find bugs efficiently with the assistance of vulnerability prediction. Moreover, V-Fuzz has discovered ten common vulnerabilities and exposures (CVEs), and three of them are newly discovered.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available