2021
DOI: 10.1109/access.2021.3129062
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating Code Coverage for Kernel Fuzzers via Function Call Graph

Abstract: The OS kernel, which has full system privileges, is an attractive attack surface. A kernel fuzzer that targets system calls in fuzzing is a popular tool for discovering kernel bugs that can induce kernel privilege escalation attacks. To the best of our knowledge, the relevance of code coverage, which is obtained by fuzzing, to the system call has not been studied yet. For instance, modern coverage-guided kernel fuzzers, such as Syzkaller, estimate code coverage by comparing the entire set of executed basic blo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 15 publications
0
1
0
Order By: Relevance
“…Let us note that in this approach, the so-called error space grows exponentially as the system's complexity increases. The problem with a vast error space can be solved using a testing technique called fuzzing, which is an automated or semi-automated software testing technique that involves providing incorrect, unexpected or random data as input to the system [8], [9], [10], [11]. An effective fuzzer generates such input data that is sufficiently correct not to be directly rejected by the parser but is at the same time sufficiently incorrect to cause unexpected system behavior.…”
Section: Introductionmentioning
confidence: 99%
“…Let us note that in this approach, the so-called error space grows exponentially as the system's complexity increases. The problem with a vast error space can be solved using a testing technique called fuzzing, which is an automated or semi-automated software testing technique that involves providing incorrect, unexpected or random data as input to the system [8], [9], [10], [11]. An effective fuzzer generates such input data that is sufficiently correct not to be directly rejected by the parser but is at the same time sufficiently incorrect to cause unexpected system behavior.…”
Section: Introductionmentioning
confidence: 99%