2019 IEEE Symposium on Security and Privacy (SP) 2019
DOI: 10.1109/sp.2019.00069
|View full text |Cite
|
Sign up to set email alerts
|

Full-Speed Fuzzing: Reducing Fuzzing Overhead through Coverage-Guided Tracing

Abstract: Coverage-guided fuzzing is one of the most successful approaches for discovering software bugs and security vulnerabilities. Of its three main components: (1) test case generation, (2) code coverage tracing, and (3) crash triage, code coverage tracing is a dominant source of overhead. Coverageguided fuzzers trace every test case's code coverage through either static or dynamic binary instrumentation, or more recently, using hardware support. Unfortunately, tracing all test cases incurs significant performance … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
42
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 102 publications
(43 citation statements)
references
References 37 publications
1
42
0
Order By: Relevance
“…To address this issue, we discard dynamic binary instrumentation in favor of fullspeed fuzzing [47] to collect code coverage. Fullspeed fuzzing does not introduce any overhead except when the fuzzer discovers a new basic block.…”
Section: B Reliable Instrumentationmentioning
confidence: 99%
“…To address this issue, we discard dynamic binary instrumentation in favor of fullspeed fuzzing [47] to collect code coverage. Fullspeed fuzzing does not introduce any overhead except when the fuzzer discovers a new basic block.…”
Section: B Reliable Instrumentationmentioning
confidence: 99%
“…Jia et al [19] find some limitations in the algorithm of AFL. To reduce fuzzing overhead, UnTracer [27] proposes coverageguided tracing to trace only coverage-increasing test cases. Coverageincreasing test cases can self-report when a test case produces new coverage.…”
Section: Related Workmentioning
confidence: 99%
“…Considering the lack of dynamic analysis technology for IoT-based services, this paper applies static analysis technology and Linux ptrace system call to obtain dynamic firmware information, including the execution time of functions, sample execution path, etc, at runtime. This information can be applied to aid performance analysis [29] and dynamic security detection [10,17,25,27] for IoT-based services.…”
mentioning
confidence: 99%