CAB-FUZZ: Practical concolic testing techniques for COTS operating systems

Cited 29 time in webofscience Cited 0 time in scopus
  • Hit : 245
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorSu Yong Kimko
dc.contributor.authorSangho Leeko
dc.contributor.authorInsu Yunko
dc.contributor.authorWen Xuko
dc.contributor.authorByoungyoung Leeko
dc.contributor.authorYoungtae Yunko
dc.contributor.authorTaesoo Kimko
dc.date.accessioned2021-02-08T00:30:19Z-
dc.date.available2021-02-08T00:30:19Z-
dc.date.created2021-02-08-
dc.date.created2021-02-08-
dc.date.created2021-02-08-
dc.date.issued2017-07-14-
dc.identifier.citation2017 USENIX Annual Technical Conference (ATC '17), pp.689 - 701-
dc.identifier.urihttp://hdl.handle.net/10203/280628-
dc.description.abstractDiscovering the security vulnerabilities of commercial off-the-shelf (COTS) operating systems (OSes) is challenging because they not only are huge and complex, but also lack detailed debug information. Concolic testing, which generates all feasible inputs of a program by using symbolic execution and tests the program with the generated inputs, is one of the most promising approaches to solve this problem. Unfortunately, the state-of-the-art concolic testing tools do not scale well for testing COTS OSes because of state explosion. Indeed, they often fail to find a single bug (or crash) in COTS OSes despite their long execution time. In this paper, we propose CAB-FUZZ (Context-Aware and Boundary-focused), a practical concolic testing tool to quickly explore interesting paths that are highly likely triggering real bugs without debug information. First, CAB-FUZZ prioritizes the boundary states of arrays and loops, inspired by the fact that many vulnerabilities originate from a lack of proper boundary checks. Second, CAB-FUZZ exploits real programs interacting with COTS OSes to construct proper contexts to explore deep and complex kernel states without debug information. We applied CAB-FUZZ to Windows 7 and Windows Server 2008 and found 21 undisclosed unique crashes, including two local privilege escalation vulnerabilities (CVE-2015-6098 and CVE-2016-0040) and one information disclosure vulnerability in a cryptography driver (CVE-2016-7219). CAB-FUZZ found vulnerabilities that are non-trivial to discover; five vulnerabilities have existed for 14 years, and we could trigger them even in the initial version of Windows XP (August 2001).-
dc.languageEnglish-
dc.publisherUSENIX Association-
dc.titleCAB-FUZZ: Practical concolic testing techniques for COTS operating systems-
dc.typeConference-
dc.identifier.wosid000428763500052-
dc.identifier.scopusid2-s2.0-85053025905-
dc.type.rimsCONF-
dc.citation.beginningpage689-
dc.citation.endingpage701-
dc.citation.publicationname2017 USENIX Annual Technical Conference (ATC '17)-
dc.identifier.conferencecountryUS-
dc.identifier.conferencelocationSanta Clara-
dc.contributor.localauthorInsu Yun-
dc.contributor.nonIdAuthorSu Yong Kim-
dc.contributor.nonIdAuthorSangho Lee-
dc.contributor.nonIdAuthorWen Xu-
dc.contributor.nonIdAuthorByoungyoung Lee-
dc.contributor.nonIdAuthorYoungtae Yun-
dc.contributor.nonIdAuthorTaesoo Kim-
Appears in Collection
EE-Conference Papers(학술회의논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 29 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0