2022 IEEE Symposium on Security and Privacy (SP) 2022
DOI: 10.1109/sp46214.2022.9833796
|View full text |Cite
|
Sign up to set email alerts
|

JIGSAW: Efficient and Scalable Path Constraints Fuzzing

Abstract: Malware classifiers are subject to training-time exploitation due to the need to regularly retrain using samples collected from the wild. Recent work has demonstrated the feasibility of backdoor attacks against malware classifiers, and yet the stealthiness of such attacks is not well understood. In this paper, we investigate this phenomenon under the clean-label setting (i.e., attackers do not have complete control over the training or labeling process). Empirically, we show that existing backdoor attacks in m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 77 publications
0
4
0
1
Order By: Relevance
“…However, these methods are far from perfect since they are built on the token level and the AST level rather than the semantic level, and this leads to the scenario that two semantically equal code snippets may have a relatively low CodeBLEU score. Some methods like dynamic testing [29] or symbolic execution [20,54] have been proposed to solve this. But such methods are either too heavy to be practical or even impractical for code snippet which does not have a clear input and output.…”
Section: Discussionmentioning
confidence: 99%
“…However, these methods are far from perfect since they are built on the token level and the AST level rather than the semantic level, and this leads to the scenario that two semantically equal code snippets may have a relatively low CodeBLEU score. Some methods like dynamic testing [29] or symbolic execution [20,54] have been proposed to solve this. But such methods are either too heavy to be practical or even impractical for code snippet which does not have a clear input and output.…”
Section: Discussionmentioning
confidence: 99%
“…Using program analysis and constraint solving, DSE can generate inputs that effectively penetrate through the path constraints toward the target sites. Although some state-of-the-art works, such as symcc [40], symqemu [39], and JigSaw [9], have been proposed to develop the symbolic execution, the heavyweight program analysis, path-explosion problem, and constraint solving of DSE still limit its scalability.…”
Section: Related Workmentioning
confidence: 99%
“…Researchers continue to refine graybox fuzzing techniques by developing new methodologies for mutating test cases [3,21,33,39], managing test cases [11,43,48], providing feedback on program behavior [15,23,35,47,49] and more [13,34,41,50].…”
Section: Fuzz Testingmentioning
confidence: 99%