期刊文献+

基于动态适应度函数的模糊测试技术研究 被引量:6

Research on fuzzing technique based on dynamic fitness function
下载PDF
导出
摘要 模糊测试是一种有效的自动化漏洞挖掘技术,主流模糊测试技术采用遗传算法生成测试用例,存在早熟现象,导致路径覆盖率不足。针对该问题,提出一种基于动态适应度函数的模糊测试方法。综合考虑了种子新度和路径深度因素,设计了根据测试阶段不同而动态变化的适应度函数,实现了基于动态适应度函数的模糊测试工具DynFuzzer。在BegBunch和CGC提供的测试集上进行实验,结果表明,与现有模糊测试工具相比,DynFuzzer路径覆盖率提高了40%,多发现了10%的bug。基于动态适应度函数的模糊测试方法能有效克服早熟问题,提高路径覆盖率,发现更多的bug。 Fuzzing is an effective technique for automatically mining vulnerabilities. The mainstream fuzzing technique uses genetic algorithm to generate cases for testing, but almost there exists a premature phenomenon, which leads to lower ratio of path coverage. Given this problem, this paper proposed a fuzzing test method based on dynamic fitness function. Considering the newness of seed and the depth of the path, it designed an improved fitness function of dynamic change with different test phases, by which, implemented the fuzzing testing tool--DynFuzzer. On the test set provided by BegBunch and CGC, it devised a experiment. The results show that compared with the existing fuzzing test tools, the DynFuzzer path coverage is 40% higher and 10% more bugs are found. The fuzzing test method based on dynamic fitness function can overcome the problem of prematurity, improve path coverage and find more bugs.
作者 邓一杰 刘克胜 朱凯龙 常超 Deng Yijie;Liu Kesheng;Zhu Kailong;Chang Chao(National University of Defense Technology, Electronic Engineering Institute, Hefei 230031, China)
出处 《计算机应用研究》 CSCD 北大核心 2019年第5期1415-1418,1427,共5页 Application Research of Computers
基金 国家重点研发计划重点专项资助项目(2017YFB0802905)
关键词 遗传算法 动态适应度函数 DynFuzzer 路径覆盖率 genetic algorithm dynamic fitness function DynFuzzer path coverage
  • 相关文献

参考文献4

二级参考文献60

  • 1邵林,张小松,苏恩标.一种基于fuzzing技术的漏洞发掘新思路[J].计算机应用研究,2009,26(3):1086-1088. 被引量:17
  • 2张宝峰,张翀斌,许源.基于模糊测试的网络协议漏洞挖掘[J].清华大学学报(自然科学版),2009(S2):2113-2118. 被引量:14
  • 3MILLER B P, FREDRIKSON L, SO B. An empirical study of the reliablity of UNIX utilities[ J]. Communications of the ACM, 1990, 33(2) :32.
  • 4AITEL D. The advantages of block-based protocol analysis for security testing[ R]. New York: Immunity Inc, 2002.
  • 5SPIKE [ EB/OL ]. ( 2009- 06 ). http ://www. immunitysec, com/resources-freesoftware, shtml.
  • 6GODEFROID P, LEVIN M, MOLNAR D. Active property checking [ C]//Proc of the 8th ACM International Conference on Embedeling Software. 2008 : 19-24.
  • 7GODEFROID P, LEVIN M, MOLNAR D. Automated whitebox fuzz testing[ C ]//Proc of Network Distributed Security Symposium. 2005.
  • 8MILLER B P, KOSKI D, LEE C P,et al. Fuzzing revisted: a reexamination of the reliability of UNIX utilities and services [ R]. Madison: University of Wisconsin Madison, 1995.
  • 9SUTTON M, GREENE A, AMINI P. Fuzzing: brute vulnerability discovery[ M]. [ S. l. ] : Pearson Education Inc, 2007 : 16.
  • 10ANDREA L, LORENZO M, MATTIA M,et al. A smart fuzzer for x86 executables[ C ]//Proc of the 3rd International Workshop on Software Engineering for Secure Systems. [ S. l. ] : IEEE Computer Society, 2007:7.

共引文献86

同被引文献74

引证文献6

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部