Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security 2019
DOI: 10.1145/3321705.3329828
|View full text |Cite
|
Sign up to set email alerts
|

PTrix

Abstract: Despite its effectiveness in uncovering software defects, American Fuzzy Lop (AFL), one of the best grey-box fuzzers, is inefficient when fuzz-testing source-unavailable programs. AFL's binary-only fuzzing mode, QEMU-AFL, is typically 2-5× slower than its sourceavailable fuzzing mode. The slowdown is largely caused by the heavy dynamic instrumentation.Recent fuzzing techniques use Intel Processor Tracing (PT), a light-weight tracing feature supported by recent Intel CPUs, to remove the need of dynamic instrume… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 42 publications
(6 citation statements)
references
References 25 publications
0
6
0
Order By: Relevance
“…Using the packet trace captured by Intel PT along with the corresponding binary of the PUT, the execution path of the PUT could be fully reconstructed. There have been attempts of fuzzing with PT [10,[112][113][114], but it has never been used to DGF yet. For the problem of target identification and labeling at the binary code level, a machine-learning-based approach [30,31] and a heuristic binary diffing approach [100] can be leveraged to automatically identify the vulnerable code.…”
Section: Dependence On the Put Source Codementioning
confidence: 99%
See 1 more Smart Citation
“…Using the packet trace captured by Intel PT along with the corresponding binary of the PUT, the execution path of the PUT could be fully reconstructed. There have been attempts of fuzzing with PT [10,[112][113][114], but it has never been used to DGF yet. For the problem of target identification and labeling at the binary code level, a machine-learning-based approach [30,31] and a heuristic binary diffing approach [100] can be leveraged to automatically identify the vulnerable code.…”
Section: Dependence On the Put Source Codementioning
confidence: 99%
“…However, emulator‐based tools are usually less efficient. For example, the execution speed of vanilla AFL is 2‐5 times faster than its QEMU mode [112]. Second, difficulty in collecting target information .…”
Section: Challenges Faced By Dgfmentioning
confidence: 99%
“…Hardware tracing has already enabled a variety of client tasks, including testing/fuzzing [5,28,47,63], debugging [30,33,34,44], security enforcement [32,39,55], performance tuning [50,51], etc. Multiple fuzzing systems, such as Honggfuzz, kAFL, PTFuzz, and PTrix, collect code coverage information via PT so as to efficiently guide the fuzzing process.…”
Section: Applications Of Hardware Tracingmentioning
confidence: 99%
“…Modern CPUs are equipped with tracing modules such as Intel processor trace (PT) [19] and ARM embedded trace macrocell (ETM) [18], providing ultra efficiency for control-flow profiling of end-to-end program executions. With these hardware traces, it is possible to reconstruct a program's complete execution flow, enabling a wide spectrum of client applications in testing [5,28,47,[61][62][63], debugging [27,30,64,65], performance analysis [50,51], etc. For example, with a program's control flow, various execution statistics, such as function and statement coverage, path profiles, call tree profiles, etc.…”
Section: Introductionmentioning
confidence: 99%
“…In this scenario, SHIFT can borrow design ideas from previous works (e.g., Chen et al, 2019, andLi et al, 2022) to acquire coverage information from blobs using tracing components provided by the Cortex-M architecture (e.g., the ARM-embedded trace macrocell (ETM) or the embedded trace buffer (ETB), ARM Ltd., 2020b). These 4.6.…”
Section: Configuring Mcu Internalsmentioning
confidence: 99%