Logos: Log Guided Fuzzing for Protocol Implementations

被引:3
|
作者
Wu, Feifan [1 ]
Luo, Zhengxiong [1 ]
Zhao, Yanyang [1 ]
Du, Qingpeng [2 ]
Yu, Junze [1 ]
Peng, Ruikang [3 ]
Shi, Heyuan [3 ]
Jiang, Yu [1 ]
机构
[1] Tsinghua Univ, BNRist, Beijing, Peoples R China
[2] Beijing Univ Posts & Telecommun, Beijing, Peoples R China
[3] Cent South Univ, Changsha, Peoples R China
关键词
Protocol Fuzzing; Vulnerability Detection;
D O I
10.1145/3650212.3680394
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Network protocols are extensively used in a variety of network devices, making the security of their implementations crucial. Protocol fuzzing has shown promise in uncovering vulnerabilities in these implementations. However traditional methods often require instrumentation of the target implementation to provide guidance, which is intrusive, adds overhead, and can hinder black-box testing. This paper presents Logos, a protocol fuzzer that utilizes nonintrusive runtime log information for fuzzing guidance. Logos first standardizes the unstructured logs and embeds them into a highdimensional vector space for semantic representation. Then, Logos filters the semantic representation and dynamically maintains a semantic coverage to chart the explored space for customized guidance. We evaluate Logos on eight widely used implementations of well-known protocols. Results show that, compared to existing intrusive or expert knowledge-driven protocol fuzzers, Logos achieves 26.75%-106.19% higher branch coverage within 24 hours. Furthermore, Logos exposed 12 security-critical vulnerabilities in these prominent protocol implementations, with 9 CVEs assigned.
引用
收藏
页码:1720 / 1732
页数:13
相关论文
共 50 条
  • [1] Protocol state fuzzing of TLS implementations
    de Ruiter, Joeri
    Poll, Erik
    PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, 2015, : 193 - 206
  • [2] AGLFuzz: Automata-Guided Fuzzing for detecting logic errors in security protocol implementations
    Zhao, Dongliang
    Guo, Jiaxing
    Gu, Chunxiang
    Zheng, Yonghui
    Zhang, Xieli
    COMPUTERS & SECURITY, 2025, 149
  • [3] Fuzzing for Stateful Protocol Implementations: Are We There Yet?
    Jian, Kunpeng
    Zou, Yanyan
    Li, Yeting
    Cao, Jialun
    Li, Menghao
    Sun, Jian
    Shi, Jingyi
    Huo, Wei
    THEORETICAL ASPECTS OF SOFTWARE ENGINEERING, TASE 2024, 2024, 14777 : 186 - 204
  • [4] BLEEM: Packet Sequence Oriented Fuzzing for Protocol Implementations
    Luo, Zhengxiong
    Yu, Junze
    Zuo, Feilong
    Liu, Jianzhong
    Jiang, Yu
    Chen, Ting
    Roychoudhury, Abhik
    Sun, Jiaguang
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 4481 - 4498
  • [5] Securing Next Generation Networks by Fuzzing Protocol Implementations
    Juuso, Anna-Maija
    Rontti, Tero
    Tirila, Juha-Matti
    2011 TECHNICAL SYMPOSIUM AT ITU TELECOM WORLD (ITU WT), 2011, : 7 - 12
  • [6] Analysis of DTLS Implementations Using Protocol State Fuzzing
    Fiterau-Brostean, Paul
    Jonsson, Bengt
    Merget, Robert
    de Ruiter, Joeri
    Sagonas, Konstantinos
    Somorovsky, Juraj
    PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, 2020, : 2523 - 2540
  • [7] Green-Fuzz: Efficient Fuzzing for Network Protocol Implementations
    Andarzian, Seyed Behnam
    Daniele, Cristian
    Poll, Erik
    FOUNDATIONS AND PRACTICE OF SECURITY, PT I, FPS 2023, 2024, 14551 : 253 - 268
  • [8] Protocol Fuzzing With Specification Guided Message Generation
    Li, Senyi
    Li, Junqiang
    Fu, Jingxuan
    Xue, Mingwu
    Yu, Hongfang
    Sun, Gang
    2021 6TH INTERNATIONAL CONFERENCE ON UK-CHINA EMERGING TECHNOLOGIES (UCET 2021), 2021, : 164 - 170
  • [9] Netfuzzlib: Adding First-Class Fuzzing Support to Network Protocol Implementations
    Robben, Jeroen
    Vanhoef, Mathy
    COMPUTER SECURITY-ESORICS 2024, PT II, 2024, 14983 : 65 - 84
  • [10] Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing
    Aafer, Yousra
    You, Wei
    Sun, Yi
    Shi, Yu
    Zhang, Xiangyu
    Yin, Heng
    PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 2759 - 2776