Proceedings 2020 Network and Distributed System Security Symposium 2020
DOI: 10.14722/ndss.2020.24415
|View full text |Cite
|
Sign up to set email alerts
|

HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing

Abstract: Fifteen billion devices run Java and many of them are connected to the Internet. As this ecosystem continues to grow, it remains an important task to discover any unknown security threats these devices face. Fuzz testing repeatedly runs software on random inputs in order to trigger unexpected program behaviors, such as crashes or timeouts, and has historically revealed serious security vulnerabilities. Contemporary fuzz testing techniques focus on identifying memory corruption vulnerabilities that allow advers… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(3 citation statements)
references
References 35 publications
0
3
0
Order By: Relevance
“…Therefore, SlowFuzz [152] detects AC bugs via guiding fuzzing towards executions that increase the number of executed instructions. Similarly, HotFuzz [15] detects AC bugs in Java methods via maximizing the resource consumption of individual methods. MemLock [44] detects AC bugs based on both metrics of edge coverage and memory consumption.…”
Section: Algorithmic Complexitymentioning
confidence: 99%
“…Therefore, SlowFuzz [152] detects AC bugs via guiding fuzzing towards executions that increase the number of executed instructions. Similarly, HotFuzz [15] detects AC bugs in Java methods via maximizing the resource consumption of individual methods. MemLock [44] detects AC bugs based on both metrics of edge coverage and memory consumption.…”
Section: Algorithmic Complexitymentioning
confidence: 99%
“…Following the publication of AFL [66], its impact soon caused a wave of additional research. Almost every design choice was investigated: AFL's input mutation algorithm where extended upon [1,3,16,23,42,45] as was its ability to trigger and identify bugs [5,5,29,40,41,61,64]. To improve the strength of AFL's semi-random mutations, many researchers proposed to combine fuzzing with more elaborate program analysis techniques such as taint tracking [11,48] and symbolic or concolic execution [19-22, 27, 37, 44, 56, 59, 65, 68].…”
Section: Related Workmentioning
confidence: 99%
“…Based on the feedback information from the execution of the PUT, greybox fuzzers use an evolutionary algorithm to generate new inputs and explore paths. Greybox fuzzing is widely used to test application software, libraries [8, 9], kernel code [10–12], and protocols [13–15]. Most greybox fuzzing tools are coverage‐guided, which aim to cover as many program paths as possible within a limited time budget.…”
Section: Introductionmentioning
confidence: 99%