語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Practical Methods for Fuzzing Real-W...
~
Srivastava, Prashast.
FindBook
Google Book
Amazon
博客來
Practical Methods for Fuzzing Real-World Systems.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Practical Methods for Fuzzing Real-World Systems./
作者:
Srivastava, Prashast.
出版者:
Ann Arbor : ProQuest Dissertations & Theses, : 2023,
面頁冊數:
146 p.
附註:
Source: Dissertations Abstracts International, Volume: 85-01, Section: A.
Contained By:
Dissertations Abstracts International85-01A.
標題:
Grammar. -
電子資源:
https://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=30540018
ISBN:
9798379875756
Practical Methods for Fuzzing Real-World Systems.
Srivastava, Prashast.
Practical Methods for Fuzzing Real-World Systems.
- Ann Arbor : ProQuest Dissertations & Theses, 2023 - 146 p.
Source: Dissertations Abstracts International, Volume: 85-01, Section: A.
Thesis (Ph.D.)--Purdue University, 2023.
This item must not be sold to any third party vendors.
The current software ecosystem is exceptionally complex. A key defining feature of this complexity is the vast input space that software applications must process. This feature inhibits fuzzing (an effective automated testing methodology) in uncovering deep bugs (i.e., bugs with complex preconditions). We improve the bug-finding capabilities of fuzzers by reducing the input space that they have to explore. Our techniques incorporate domain knowledge from the software under test. In this dissertation, we research how to incorporate domain knowledge in different scenarios across a variety of software domains and test objectives to perform deep bug discovery.We start by focusing on language interpreters that form the backend of our web ecosystem. Uncovering deep bugs in these interpreters requires synthesizing inputs that perform a diverse set of semantic actions. To tackle this issue, we present Gramatron, a fuzzer that employs grammar automatons to speed up bug discovery. Then, we explore firmwares belonging to the rapidly growing IoT ecosystem which generally lack thorough testing. FirmFuzz infers the appropriate runtime state required to trigger vulnerabilities in these firmwares using the domain knowledge encoded in the user-facing network applications. Additionally, we showcase how our proposed strategy to incorporate domain knowledge is beneficial under alternative testing scenarios where a developer analyzes specific code locations, e.g., for patch testing. SieveFuzz leverages knowledge of targeted code locations to prohibit exploration of code regions and correspondingly parts of the input space that are irrelevant to reaching the target location. Finally, we move beyond the realm of memory-safety vulnerabilities and present how domain knowledge can be useful in uncovering logical bugs, specifically deserialization vulnerabilities in Java-based applications with Crystallizer. Crystallizer uses a hybrid analysis methodology to first infer an over-approximate set of possible payloads through static analysis (to constrain the search space). Then, it uses dynamic analysis to instantiate concrete payloads as a proof-of-concept of a deserialization vulnerability.Throughout these four diverse areas we thoroughly demonstrate how incorporating domain knowledge can massively improve bug finding capabilities. Our research has developed tooling that not only outperforms the existing state-of-the-art in terms of efficient bug discovery (with speeds up to 117% faster), but has also uncovered 18 previously unknown bugs, with five CVEs assigned.
ISBN: 9798379875756Subjects--Topical Terms:
899712
Grammar.
Practical Methods for Fuzzing Real-World Systems.
LDR
:03665nmm a2200361 4500
001
2394554
005
20240422071038.5
006
m o d
007
cr#unu||||||||
008
251215s2023 ||||||||||||||||| ||eng d
020
$a
9798379875756
035
$a
(MiAaPQ)AAI30540018
035
$a
(MiAaPQ)Purdue22693258
035
$a
AAI30540018
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Srivastava, Prashast.
$3
3764031
245
1 0
$a
Practical Methods for Fuzzing Real-World Systems.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2023
300
$a
146 p.
500
$a
Source: Dissertations Abstracts International, Volume: 85-01, Section: A.
500
$a
Advisor: Payer, Mathias.
502
$a
Thesis (Ph.D.)--Purdue University, 2023.
506
$a
This item must not be sold to any third party vendors.
520
$a
The current software ecosystem is exceptionally complex. A key defining feature of this complexity is the vast input space that software applications must process. This feature inhibits fuzzing (an effective automated testing methodology) in uncovering deep bugs (i.e., bugs with complex preconditions). We improve the bug-finding capabilities of fuzzers by reducing the input space that they have to explore. Our techniques incorporate domain knowledge from the software under test. In this dissertation, we research how to incorporate domain knowledge in different scenarios across a variety of software domains and test objectives to perform deep bug discovery.We start by focusing on language interpreters that form the backend of our web ecosystem. Uncovering deep bugs in these interpreters requires synthesizing inputs that perform a diverse set of semantic actions. To tackle this issue, we present Gramatron, a fuzzer that employs grammar automatons to speed up bug discovery. Then, we explore firmwares belonging to the rapidly growing IoT ecosystem which generally lack thorough testing. FirmFuzz infers the appropriate runtime state required to trigger vulnerabilities in these firmwares using the domain knowledge encoded in the user-facing network applications. Additionally, we showcase how our proposed strategy to incorporate domain knowledge is beneficial under alternative testing scenarios where a developer analyzes specific code locations, e.g., for patch testing. SieveFuzz leverages knowledge of targeted code locations to prohibit exploration of code regions and correspondingly parts of the input space that are irrelevant to reaching the target location. Finally, we move beyond the realm of memory-safety vulnerabilities and present how domain knowledge can be useful in uncovering logical bugs, specifically deserialization vulnerabilities in Java-based applications with Crystallizer. Crystallizer uses a hybrid analysis methodology to first infer an over-approximate set of possible payloads through static analysis (to constrain the search space). Then, it uses dynamic analysis to instantiate concrete payloads as a proof-of-concept of a deserialization vulnerability.Throughout these four diverse areas we thoroughly demonstrate how incorporating domain knowledge can massively improve bug finding capabilities. Our research has developed tooling that not only outperforms the existing state-of-the-art in terms of efficient bug discovery (with speeds up to 117% faster), but has also uncovered 18 previously unknown bugs, with five CVEs assigned.
590
$a
School code: 0183.
650
4
$a
Grammar.
$3
899712
650
4
$a
Software.
$2
gtt.
$3
619355
650
4
$a
Libraries.
$3
525303
650
4
$a
Semantics.
$3
520060
650
4
$a
Payloads.
$3
3685274
650
4
$a
Computer science.
$3
523869
650
4
$a
Information technology.
$3
532993
650
4
$a
Logic.
$3
529544
650
4
$a
Web studies.
$3
2122754
690
$a
0984
690
$a
0489
690
$a
0395
690
$a
0646
710
2
$a
Purdue University.
$3
1017663
773
0
$t
Dissertations Abstracts International
$g
85-01A.
790
$a
0183
791
$a
Ph.D.
792
$a
2023
793
$a
English
856
4 0
$u
https://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=30540018
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9502874
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入