Back to Search Start Over

Poster

Authors :
Taekyoung Kwon
Seoyoung Kim
Seyeon Jeong
Soochang Chung
Mingi Cho
Source :
CCS
Publication Year :
2019
Publisher :
ACM, 2019.

Abstract

The OS kernel, which has entire system privileges, is an attractive target of attackers. To reduce this threat, we need to find security bugs in the kernel prior to the attackers, and system call fuzzing is a widely used technique for this purpose. However, many system call fuzzers have not been evaluated for coverage performance which is an important indicator in fuzzing. In this poster, we propose a methodology to evaluate the code coverage performance of system call fuzzers with a strategy that combines virtualization and Intel Processor Trace (PT). First, we extract all the functions in the kernel that can be executed by system calls. Then we perform fuzzing with the target system call fuzzer on the guest OS, and record coverage information by leveraging the Intel PT. Finally, we evaluate system call fuzzers by comparing the list of functions related to system calls with the executed functions logged by Intel PT while fuzzing.

Details

Database :
OpenAIRE
Journal :
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
Accession number :
edsair.doi...........0984fb4e01549fb988044d0d8fc9bd1a
Full Text :
https://doi.org/10.1145/3319535.3363288