1. DocFuzz: A Directed Fuzzing Method Based on a Feedback Mechanism Mutator.
- Author
-
Xie, Lixia, Zhao, Yuheng, Yang, Hongyu, Zhao, Ziwen, Hu, Ze, Zhang, Liang, Cheng, Xiang, and Tan, Yu-an
- Subjects
REINFORCEMENT learning ,BLOCK codes ,SOURCE code ,COMPUTER programming education - Abstract
In response to the limitations of traditional fuzzing approaches that rely on static mutators and fail to dynamically adjust their test case mutations for deeper testing, resulting in the inability to generate targeted inputs to trigger vulnerabilities, this paper proposes a directed fuzzing methodology termed DocFuzz, which is predicated on a feedback mechanism mutator. Initially, a sanitizer is used to target the source code of the tested program and stake in code blocks that may have vulnerabilities. After this, a taint tracking module is used to associate the target code block with the bytes in the test case, forming a high‐value byte set. Then, the reinforcement learning mutator of DocFuzz is used to mutate the high‐value byte set, generating well‐structured inputs that can cover the target code blocks. Finally, utilizing the feedback mechanism of DocFuzz, when the reinforcement learning mutator converges and ceases to optimize, the fuzzer is rebooted to continue mutating toward directions that are more likely to trigger vulnerabilities. Comparative experiments are conducted on multiple test sets, including LAVA‐M, and the experimental results demonstrate that the proposed DocFuzz methodology surpasses other fuzzing techniques, offering a more precise, rapid, and effective means of detecting vulnerabilities in source code. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF