Title :
T3FAH: A TTCN-3 Based Fuzzer with Attack Heuristics
Author :
Xu, Luo ; Wu, Ji ; Liu, Chao
Author_Institution :
Sch. of Comput. Sci. & Eng., Beihang Univ., Beijing, China
fDate :
March 31 2009-April 2 2009
Abstract :
Fuzzing is an effective approach to detect vulnerabilities. Unfortunately, the existing fuzzing approach suffers from some limitations, especially lacking support for automation in extracting the SUT specific knowledge and generating test script. In this paper, by combining fuzzing with TTCN-3 technique, we present T3FAH: a TTCN-3 based Fuzzer with Attack Heuristics. The approach automatically extracts the input syntax of SUT from existing test data definitions in TTCN-3 conformance test suite, generates invalid inputs based on the attack heuristic generation algorithm, and automatically constructs fuzzing test script via reusing the conformance test case. We conducted a case study on three popular SIP terminals with different SIP protocol implementations. In the case study, our approach detected several different vulnerabilities in all three SIP terminals, which may damage user experience in the practical use. It proves that our approach can be effectively used for testing real world applications.
Keywords :
conformance testing; fuzzy systems; program testing; protocols; SIP protocol; T3FAH; TTCN-3 conformance test suite; attack heuristic generation algorithm; conformance test case; fuzzer; fuzzing test script; test data definition; Automatic testing; Computer science; Data mining; Heuristic algorithms; Logic testing; Protocols; Software testing; System testing; Telecommunication standards; Vehicle crash testing; Attack Heuristics; Fuzzing; SIP; Security Testing; TTCN-3;
Conference_Titel :
Computer Science and Information Engineering, 2009 WRI World Congress on
Conference_Location :
Los Angeles, CA
Print_ISBN :
978-0-7695-3507-4
DOI :
10.1109/CSIE.2009.706