DocumentCode :
3722827
Title :
A Smart Fuzzing Method for Detecting Heap-Based Buffer Overflow in Executable Codes
Author :
Maryam Mouzarani;Babak Sadeghiyan;Mohammad Zolfaghari
Author_Institution :
Dept. of Comput. Eng. &
fYear :
2015
Firstpage :
42
Lastpage :
49
Abstract :
This paper presents a new concolic execution-based smart fuzzer for detecting heap-based buffer overflow in the executable codes. The proposed fuzzer executes the target program with concrete input data and calculates the constraints of the executed path symbolically. The path constraints are used to generate test data that traverse new execution paths in the target program. For each executed path, the fuzzer also calculates heap-based buffer overflow constraints. These constraints determine what input data may cause heap-based buffer overflow in the executed path. By combining the path and vulnerability constraints new test data are generated, if possible, that traverse a specific execution path and activate specific vulnerability in that path. We implemented the proposed smart fuzzer as a plug-in for Valgrind framework. The implemented fuzzer is tested on different groups of test programs. The experiments demonstrate that the fuzzer can detect the vulnerabilities in these programs accurately.
Keywords :
"Concrete","Instruments","Software","Resource management","Computers","Electronic mail","Testing"
Publisher :
ieee
Conference_Titel :
Dependable Computing (PRDC), 2015 IEEE 21st Pacific Rim International Symposium on
Type :
conf
DOI :
10.1109/PRDC.2015.10
Filename :
7371847
Link To Document :
بازگشت