One of the major limitations of mutation-based grey-box fuzzers is that they struggle in accessing code protected by magic bytes comparisons, which are routinely employed by parsers. The best solu- tion to this problem, the Steelix heuristic, proposes an implementation based on static binary instrumentation. This work demonstrates that, by using instead dynamic binary instrumentation, it is possible to obtain comparable performance and gain advantages in terms of precision and exibility of the instrumentation. We have demonstrated the feasibility of this approach both on a standard academic benchmark, LAVA-M, and on real-life large-scale software, using the macOS framework ImageIO.

A QBDI-based fuzzer taming magic bytes / Geretto, E.; Tessier, C.; Massacci, F.. - 2315:(2019). ((Intervento presentato al convegno 3rd Italian Conference on Cyber Security, ITASEC 2019 tenutosi a ita nel 2019.

A QBDI-based fuzzer taming magic bytes

Geretto E.;Massacci F.
2019

Abstract

One of the major limitations of mutation-based grey-box fuzzers is that they struggle in accessing code protected by magic bytes comparisons, which are routinely employed by parsers. The best solu- tion to this problem, the Steelix heuristic, proposes an implementation based on static binary instrumentation. This work demonstrates that, by using instead dynamic binary instrumentation, it is possible to obtain comparable performance and gain advantages in terms of precision and exibility of the instrumentation. We have demonstrated the feasibility of this approach both on a standard academic benchmark, LAVA-M, and on real-life large-scale software, using the macOS framework ImageIO.
CEUR Workshop Proceedings
Aachen, Germania
CEUR-WS
Geretto, E.; Tessier, C.; Massacci, F.
A QBDI-based fuzzer taming magic bytes / Geretto, E.; Tessier, C.; Massacci, F.. - 2315:(2019). ((Intervento presentato al convegno 3rd Italian Conference on Cyber Security, ITASEC 2019 tenutosi a ita nel 2019.
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione

Utilizza questo identificativo per citare o creare un link a questo documento: http://hdl.handle.net/11572/342536
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? ND
social impact