MemLock: Memory usage guided fuzzing

Uncontrolled memory consumption is a kind of critical software security weaknesses. It can also become a security-critical vulnerability when attackers can take control of the input to consume a large amount of memory and launch a Denial-of-Service attack. However, detecting such vulnerability is ch...

Full description

Saved in:
Bibliographic Details
Main Authors: WEN, Cheng, WANG, Haijun, LI, Yuekang, QIN, Shengchao, LIU, Yang, XU, Zhiwu, CHEN, Hongxu, Xiaofei XIE, PU, Geguang, LIU, Ting
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2020
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/7081
https://ink.library.smu.edu.sg/context/sis_research/article/8084/viewcontent/3377811.3380396.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-8084
record_format dspace
spelling sg-smu-ink.sis_research-80842022-04-07T08:04:48Z MemLock: Memory usage guided fuzzing WEN, Cheng WANG, Haijun LI, Yuekang QIN, Shengchao LIU, Yang XU, Zhiwu CHEN, Hongxu Xiaofei XIE, PU, Geguang LIU, Ting Uncontrolled memory consumption is a kind of critical software security weaknesses. It can also become a security-critical vulnerability when attackers can take control of the input to consume a large amount of memory and launch a Denial-of-Service attack. However, detecting such vulnerability is challenging, as the state-of-the-art fuzzing techniques focus on the code coverage but not memory consumption. To this end, we propose a memory usage guided fuzzing technique, named MemLock, to generate the excessive memory consumption inputs and trigger uncontrolled memory consumption bugs. The fuzzing process is guided with memory consumption information so that our approach is general and does not require any domain knowledge. We perform a thorough evaluation for MemLock on 14 widely-used real-world programs. Our experiment results show that MemLock substantially outperforms the state-of-the-art fuzzing techniques, including AFL, AFLfast, PerfFuzz, FairFuzz, Angora and QSYM, in discovering memory consumption bugs. During the experiments, we discovered many previously unknown memory consumption bugs and received 15 new CVEs. 2020-05-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/7081 info:doi/10.1145/3377811.3380396 https://ink.library.smu.edu.sg/context/sis_research/article/8084/viewcontent/3377811.3380396.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Fuzz Testing Software Vulnerability Memory Consumption OS and Networks Software Engineering
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Fuzz Testing
Software Vulnerability
Memory Consumption
OS and Networks
Software Engineering
spellingShingle Fuzz Testing
Software Vulnerability
Memory Consumption
OS and Networks
Software Engineering
WEN, Cheng
WANG, Haijun
LI, Yuekang
QIN, Shengchao
LIU, Yang
XU, Zhiwu
CHEN, Hongxu
Xiaofei XIE,
PU, Geguang
LIU, Ting
MemLock: Memory usage guided fuzzing
description Uncontrolled memory consumption is a kind of critical software security weaknesses. It can also become a security-critical vulnerability when attackers can take control of the input to consume a large amount of memory and launch a Denial-of-Service attack. However, detecting such vulnerability is challenging, as the state-of-the-art fuzzing techniques focus on the code coverage but not memory consumption. To this end, we propose a memory usage guided fuzzing technique, named MemLock, to generate the excessive memory consumption inputs and trigger uncontrolled memory consumption bugs. The fuzzing process is guided with memory consumption information so that our approach is general and does not require any domain knowledge. We perform a thorough evaluation for MemLock on 14 widely-used real-world programs. Our experiment results show that MemLock substantially outperforms the state-of-the-art fuzzing techniques, including AFL, AFLfast, PerfFuzz, FairFuzz, Angora and QSYM, in discovering memory consumption bugs. During the experiments, we discovered many previously unknown memory consumption bugs and received 15 new CVEs.
format text
author WEN, Cheng
WANG, Haijun
LI, Yuekang
QIN, Shengchao
LIU, Yang
XU, Zhiwu
CHEN, Hongxu
Xiaofei XIE,
PU, Geguang
LIU, Ting
author_facet WEN, Cheng
WANG, Haijun
LI, Yuekang
QIN, Shengchao
LIU, Yang
XU, Zhiwu
CHEN, Hongxu
Xiaofei XIE,
PU, Geguang
LIU, Ting
author_sort WEN, Cheng
title MemLock: Memory usage guided fuzzing
title_short MemLock: Memory usage guided fuzzing
title_full MemLock: Memory usage guided fuzzing
title_fullStr MemLock: Memory usage guided fuzzing
title_full_unstemmed MemLock: Memory usage guided fuzzing
title_sort memlock: memory usage guided fuzzing
publisher Institutional Knowledge at Singapore Management University
publishDate 2020
url https://ink.library.smu.edu.sg/sis_research/7081
https://ink.library.smu.edu.sg/context/sis_research/article/8084/viewcontent/3377811.3380396.pdf
_version_ 1770576208397860864