Fuzzing@Home: Distributed Fuzzing on Untrusted Heterogeneous Clients

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 120
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorDaehee Jangko
dc.contributor.authorAmmar Askarko
dc.contributor.authorInsu Yunko
dc.contributor.authorStephen Tongko
dc.contributor.authorYiqin Caiko
dc.contributor.authorTaesoo Kimko
dc.date.accessioned2022-11-25T00:01:00Z-
dc.date.available2022-11-25T00:01:00Z-
dc.date.created2022-11-19-
dc.date.created2022-11-19-
dc.date.issued2022-10-26-
dc.identifier.citation25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID '22), pp.1 - 16-
dc.identifier.urihttp://hdl.handle.net/10203/300931-
dc.description.abstractFuzzing is a practical technique to automatically find vulnerabilities in software. It is well-suited to running at scale with distributed computing platforms thanks to its parallelizability. Therefore, individual researchers and companies typically setup fuzzing platforms on multiple servers and run fuzzers in parallel. However, as such resources are private, they suffer from financial and physical limits. In this paper, we propose Fuzzing@Home; the first public collaborative fuzzing network, based on heterogeneous machines owned by potentially untrusted users. Using our system, multiple organizations (or individuals) can easily collaborate to fuzz a software of common interest in an efficient way. One can participate and earn economic benefits if the fuzzing network is tied to a bug-bounty program, or simply donate spare computing power as a volunteer. If the network compensates collaborators, system fairness becomes an issue. In this light, we devise a system to make the fuzzing results verifiable and devise cheat detection techniques to ensure integrity and fairness in collaboration. In terms of performance, we devise a technique to effectively sync the global coverage state, hence minimizing the overhead for verifying computation results. Finally, to increase participation, Fuzzing@Home uses WebAssembly to run fuzzers inside the web browser engine, allowing anyone to instantly join a fuzzing network with a single click on their mobile phone, tablet, or any modern computing device. To evaluate our system, we bootstrapped Fuzzing@Home with 72 open-source projects and ran experimental fuzzing networks for 330 days with 826 collaborators as beta testers.-
dc.languageEnglish-
dc.publisherACM-
dc.titleFuzzing@Home: Distributed Fuzzing on Untrusted Heterogeneous Clients-
dc.typeConference-
dc.type.rimsCONF-
dc.citation.beginningpage1-
dc.citation.endingpage16-
dc.citation.publicationname25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID '22)-
dc.identifier.conferencecountryCY-
dc.identifier.conferencelocationLimassol, Cyprus-
dc.identifier.doi10.1145/3545948.3545971-
dc.contributor.localauthorInsu Yun-
dc.contributor.nonIdAuthorDaehee Jang-
dc.contributor.nonIdAuthorAmmar Askar-
dc.contributor.nonIdAuthorStephen Tong-
dc.contributor.nonIdAuthorYiqin Cai-
dc.contributor.nonIdAuthorTaesoo Kim-
Appears in Collection
EE-Conference Papers(학술회의논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0