We use cookies to improve your experience with our site.
Gen Zhang, Peng-Fei Wang, Tai Yue, Xiang-Dong Kong, Xu Zhou, Kai Lu. ovAFLow: Detecting Memory Corruption Bugs with Fuzzing-Based Taint Inference[J]. Journal of Computer Science and Technology, 2022, 37(2): 405-422. DOI: 10.1007/s11390-021-1600-9
Citation: Gen Zhang, Peng-Fei Wang, Tai Yue, Xiang-Dong Kong, Xu Zhou, Kai Lu. ovAFLow: Detecting Memory Corruption Bugs with Fuzzing-Based Taint Inference[J]. Journal of Computer Science and Technology, 2022, 37(2): 405-422. DOI: 10.1007/s11390-021-1600-9

ovAFLow: Detecting Memory Corruption Bugs with Fuzzing-Based Taint Inference

  • Grey-box fuzzing is an effective technology to detect software vulnerabilities, such as memory corruption. Previous fuzzers in detecting memory corruption bugs either use heavy-weight analysis, or use techniques which are not customized for memory corruption detection. In this paper, we propose a novel memory bug guided fuzzer, ovAFLow. To begin with, we broaden the memory corruption targets where we frequently identify bugs. Next, ovAFLow utilizes light-weight and effective methods to build connections between the fuzzing inputs and these corruption targets. Based on the connection results, ovAFLow uses customized techniques to direct the fuzzing process closer to memory corruption. We evaluate ovAFLow against state-of-the-art fuzzers, including AFL (american fuzzy lop), AFLFast, FairFuzz, QSYM, Angora, TIFF, and TortoiseFuzz. The evaluation results show better vulnerability detection ability of ovAFLow, and the performance overhead is acceptable. Moreover, we identify 12 new memory corruption bugs and two CVEs (common vulnerability exposures) with the help of ovAFLow.

  • loading

Catalog

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return