Extending the capacity of program-aware fuzzing with binary-level static analysis바이너리 정적 분석을 활용한 프로그램 인식형 퍼징 기술의 역량 확장

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 166
  • Download : 0
Program-aware fuzzing is a way to utilize knowledge about program behaviors during a fuzzing campaign. In this dissertation, we argue that we can extend the capacity of program-aware fuzzing by applying binary-level static analysis on previously less-explored targets. First, OS-level system binaries are significantly larger than regular application binaries, and they could hardly become a target for static analysis. We enable a scalable static analysis on system binaries with the help of modular analysis and demonstrate the first Windows kernel fuzzer that is aware of high-level system call semantics. Second, there are recently emerging execution environments, such as EVM, where traditional binary-level analysis does not apply. We broaden the scope of static binary analysis to the EVM architecture and achieve the program-awareness in smart contract fuzzing by inferring meaningful function call orders with data-flow knowledge. With the two systems, we demonstrate that the program knowledge obtained from our static analyses can indeed enhance the performance of fuzzing.
Advisors
Cha, Sang Kilresearcher차상길researcher
Description
한국과학기술원 :정보보호대학원,
Publisher
한국과학기술원
Issue Date
2022
Identifier
325007
Language
eng
Description

학위논문(박사) - 한국과학기술원 : 정보보호대학원, 2022.2,[v, 70 p. :]

URI
http://hdl.handle.net/10203/309293
Link
http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=996450&flag=dissertation
Appears in Collection
IS-Theses_Ph.D.(박사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0