UEFI Fuzz Testing Method Based on Heuristic Reverse Analysis

被引:0
|
作者
Lin, Xin-Kang [1 ,2 ]
Gu, Kuang-Yu [1 ,2 ]
Zhao, Lei [1 ,2 ]
机构
[1] Key Laboratory of Aerospace Information Security and Trusted Computing, Wuhan University, Ministry of Education, Wuhan,430072, China
[2] School of Cyber Science and Engineering, Wuhan University, Wuhan,430072, China
来源
Ruan Jian Xue Bao/Journal of Software | 2024年 / 35卷 / 08期
关键词
Firmware;
D O I
10.13328/j.cnki.jos.007116
中图分类号
学科分类号
摘要
As a next-generation firmware interface standard, the unified extensible firmware interface (UEFI) has been widely used in modern computer systems. However, UEFI vulnerabilities have also brought serious security threats. To avoid security problems caused by UEFI vulnerabilities as much as possible, vulnerability detection is needed, in which, fuzzing under third-party security testing scenarios is mainly used. Nevertheless, the absence of symbolic information affects the efficiency of testing. This study proposes a heuristic UEFI reverse analysis method, which recovers the symbolic information within the firmware, improves fuzz testing, and implements a prototype system, ReUEFuzzer. Through testing 525 EFI files from four manufacturers, the effectiveness of the reverse analysis method is demonstrated. ReUEFuzzer can enhance the function test coverage and has identified an unknown vulnerability during the testing process, which has been reported to China National Vulnerability Database and the Common Vulnerabilities and Exposures (CVE) system. Empirical evidence shows that the method presented in this paper is valid for UEFI vulnerability detection and can provide a certain degree of security guarantee for UEFI. © 2024 Chinese Academy of Sciences. All rights reserved.
引用
收藏
页码:3577 / 3590
相关论文
共 50 条
  • [1] BaSFuzz: Fuzz testing based on difference analysis for seed bytes
    Lan, Wenwei
    Huang, Chen
    Yu, Tingting
    Li, Li
    Cui, Zhanqi
    JOURNAL OF SYSTEMS AND SOFTWARE, 2025, 222
  • [2] Fuzz Testing based on Sulley Framework
    Guo, Zhong
    Li, Nan
    CURRENT TRENDS IN COMPUTER SCIENCE AND MECHANICAL AUTOMATION, VOL 1, 2017, : 181 - 187
  • [3] Fuzz Testing Based on Virtualization Technology
    Zhou, Longbin
    Li, Zhoujun
    PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON COMPUTING AND ARTIFICIAL INTELLIGENCE (ICCAI 2018), 2018, : 57 - 61
  • [4] Vulnerability mining method for industrial control network protocol based on fuzz testing
    Lai Y.
    Yang K.
    Liu J.
    Liu Z.
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2019, 25 (09): : 2265 - 2279
  • [5] Toward Fuzz Test Based on Protocol Reverse Engineering
    Cai, Jun
    Luo, Jian-Zhen
    Ruan, Jianliang
    Liu, Yan
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2017, 2017, 10701 : 892 - 897
  • [6] Improving Security Testing with Usage-Based Fuzz Testing
    Schneider, Martin A.
    Herbold, Steffen
    Wendland, Marc-Florian
    Grabowski, Jens
    RISK ASSESSMENT AND RISK-DRIVEN TESTING, 2015, 9488 : 110 - 119
  • [7] CSEFuzz: Fuzz Testing Based on Symbolic Execution
    Xie, Zhangwei
    Cui, Zhanqi
    Zhang, Jiaming
    Liu, Xiulei
    Zheng, Liwei
    IEEE ACCESS, 2020, 8 : 187564 - 187574
  • [8] Fuzz Testing in Behavior-Based Robotics
    Delgado, Rodrigo
    Campusano, Miguel
    Bergel, Alexandre
    2021 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND AUTOMATION (ICRA 2021), 2021, : 9375 - 9381
  • [9] Fuzz Testing with Dynamic Taint Analysis based Tools for Faster Code Coverage
    Paduraru, Ciprian
    Melemciuc, Marius-Constantin
    Ghimis, Bogdan
    ICSOFT: PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGIES, 2019, : 82 - 93
  • [10] RankFuzz: Fuzz Testing Based on Comprehensive Evaluation
    Li, Cheng
    Wei, Qiang
    Wang, Qingxian
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 939 - 942