Logos: Log Guided Fuzzing for Protocol Implementations

被引:3
|
作者
Wu, Feifan [1 ]
Luo, Zhengxiong [1 ]
Zhao, Yanyang [1 ]
Du, Qingpeng [2 ]
Yu, Junze [1 ]
Peng, Ruikang [3 ]
Shi, Heyuan [3 ]
Jiang, Yu [1 ]
机构
[1] Tsinghua Univ, BNRist, Beijing, Peoples R China
[2] Beijing Univ Posts & Telecommun, Beijing, Peoples R China
[3] Cent South Univ, Changsha, Peoples R China
关键词
Protocol Fuzzing; Vulnerability Detection;
D O I
10.1145/3650212.3680394
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Network protocols are extensively used in a variety of network devices, making the security of their implementations crucial. Protocol fuzzing has shown promise in uncovering vulnerabilities in these implementations. However traditional methods often require instrumentation of the target implementation to provide guidance, which is intrusive, adds overhead, and can hinder black-box testing. This paper presents Logos, a protocol fuzzer that utilizes nonintrusive runtime log information for fuzzing guidance. Logos first standardizes the unstructured logs and embeds them into a highdimensional vector space for semantic representation. Then, Logos filters the semantic representation and dynamically maintains a semantic coverage to chart the explored space for customized guidance. We evaluate Logos on eight widely used implementations of well-known protocols. Results show that, compared to existing intrusive or expert knowledge-driven protocol fuzzers, Logos achieves 26.75%-106.19% higher branch coverage within 24 hours. Furthermore, Logos exposed 12 security-critical vulnerabilities in these prominent protocol implementations, with 9 CVEs assigned.
引用
收藏
页码:1720 / 1732
页数:13
相关论文
共 50 条
  • [41] Protocol fuzzing to find security vulnerabilities of RabbitMQ
    Kwon, Soonhong
    Son, Sang-Jin
    Choi, Yangseo
    Lee, Jong-Hyouk
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (23):
  • [42] An Automated Method of Unknown Protocol Fuzzing Test
    Zhang W.-Y.
    Zhang L.
    Mao J.-L.
    Xu Z.-J.
    Zhang Y.-J.
    Jisuanji Xuebao/Chinese Journal of Computers, 2020, 43 (04): : 653 - 667
  • [43] AutoFuzz: Automated Network Protocol Fuzzing Framework
    Gorbunov, Serge
    Rosenbloom, Arnold
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (08): : 239 - 245
  • [44] SPINALFUZZ: Coverage-Guided Fuzzing for SpinalHDL Designs
    Ruep, Katharina
    Grosse, Daniel
    2022 IEEE EUROPEAN TEST SYMPOSIUM (ETS 2022), 2022,
  • [45] BSFuzz: Branch-State Guided Hybrid Fuzzing
    Hu, Qi
    Chen, Weijia
    Wang, Zhi
    Lu, Shuaibing
    Nie, Yuanping
    Li, Xiang
    Kuang, Xiaohui
    ELECTRONICS, 2023, 12 (19)
  • [46] PGFUZZ: Policy-Guided Fuzzing for Robotic Vehicles
    Kim, Hyungsub
    Ozmen, Muslum Ozgur
    Bianchi, Antonio
    Celik, Z. Berkay
    Xu, Dongyan
    28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021), 2021,
  • [47] Accelerating Fuzzing through Prefix-Guided Execution
    Li, Shaohua
    Su, Zhendong
    PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2023, 7 (OOPSLA):
  • [48] Not All Seeds Are Important: Fuzzing Guided by Untouched Edges
    Xie, Chen
    Jia, Peng
    Yang, Pin
    Hu, Chi
    Kuang, Hongbo
    Ye, Genzuo
    Hong, Xuanquan
    APPLIED SCIENCES-BASEL, 2023, 13 (24):
  • [49] ReUSB: Replay-Guided USB Driver Fuzzing
    Jang, Jisoo
    Kang, Minsuk
    Song, Dokyung
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 2921 - 2938
  • [50] Ethchecker: a context-guided fuzzing for smart contracts
    Han, Qiang
    Wang, Lu
    Zhang, Haoyu
    Shi, Leyi
    Wang, Danxin
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (10): : 13949 - 13975