dc.contributor.author | Rinard, Martin C. | |
dc.contributor.author | Ganesh, Vijay | |
dc.contributor.author | Leek, Tim | |
dc.date.accessioned | 2010-10-14T15:01:03Z | |
dc.date.available | 2010-10-14T15:01:03Z | |
dc.date.issued | 2009-06 | |
dc.date.submitted | 2009-05 | |
dc.identifier.isbn | 978-1-4244-3453-4 | |
dc.identifier.issn | 0270-5257 | |
dc.identifier.other | INSPEC Accession Number: 10699591 | |
dc.identifier.uri | http://hdl.handle.net/1721.1/59320 | |
dc.description.abstract | We present a new automated white box fuzzing technique and a tool, BuzzFuzz, that implements this technique. Unlike standard fuzzing techniques, which randomly change parts of the input file with little or no information about the underlying syntactic structure of the file, BuzzFuzz uses dynamic taint tracing to automatically locate regions of original seed input files that influence values used at key program attack points (points where the program may contain an error). BuzzFuzz then automatically generates new fuzzed test input files by fuzzing these identified regions of the original seed input files. Because these new test files typically preserve the underlying syntactic structure of the original seed input files, they tend to make it past the initial input parsing components to exercise code deep within the semantic core of the computation. We have used BuzzFuzz to automatically find errors in two open-source applications: Swfdec (an Adobe Flash player) and MuPDF (a PDF viewer). Our results indicate that our new directed fuzzing technique can effectively expose errors located deep within large programs. Because the directed fuzzing technique uses taint to automatically discover and exploit information about the input file format, it is especially appropriate for testing programs that have complex, highly structured input file formats. | en_US |
dc.description.sponsorship | National Science Foundation (U.S.) (grants CCR-0325283) | en_US |
dc.description.sponsorship | National Science Foundation (U.S.) (grant CNS-0509415) | en_US |
dc.description.sponsorship | National Science Foundation (U.S.) (grant CCF- 0811397) | en_US |
dc.description.sponsorship | United States. Dept. of Defense (Air Force Cooperative Agreement FA8750-06-2-0189) | en_US |
dc.description.sponsorship | United States. Dept. of Defense (Air Force Contract FA8721-05-C-0002) | en_US |
dc.language.iso | en_US | |
dc.publisher | Institute of Electrical and Electronics Engineers | en_US |
dc.relation.isversionof | http://dx.doi.org/10.1109/ICSE.2009.5070546 | en_US |
dc.rights | Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use. | en_US |
dc.source | IEEE | en_US |
dc.title | Taint-based Directed Whitebox Fuzzing | en_US |
dc.type | Article | en_US |
dc.identifier.citation | Ganesh, V., T. Leek, and M. Rinard. “Taint-based directed whitebox fuzzing.” Software Engineering, 2009. ICSE 2009. IEEE 31st International Conference on. 2009. 474-484. ©2009 Institute of Electrical and Electronics Engineers. | en_US |
dc.contributor.department | Lincoln Laboratory | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | en_US |
dc.contributor.approver | Rinard, Martin C. | |
dc.contributor.mitauthor | Rinard, Martin C. | |
dc.contributor.mitauthor | Ganesh, Vijay | |
dc.contributor.mitauthor | Leek, Tim | |
dc.relation.journal | IEEE 31st International Conference on Software Engineering, 2009. ICSE 2009 | en_US |
dc.eprint.version | Final published version | en_US |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | en_US |
eprint.status | http://purl.org/eprint/status/PeerReviewed | en_US |
dspace.orderedauthors | Ganesh, Vijay; Leek, Tim; Rinard, Martin | en |
dc.identifier.orcid | https://orcid.org/0000-0001-8095-8523 | |
mit.license | PUBLISHER_POLICY | en_US |
mit.metadata.status | Complete | |