QSYM: A practical concolic execution engine tailored for hybrid fuzzing

Cited 283 time in webofscience Cited 0 time in scopus
  • Hit : 235
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorInsu Yunko
dc.contributor.authorSangho Leeko
dc.contributor.authorMeng Xuko
dc.contributor.authorYeongjin Jangko
dc.contributor.authorTaesoo Kimko
dc.date.accessioned2021-02-08T00:10:16Z-
dc.date.available2021-02-08T00:10:16Z-
dc.date.created2021-02-08-
dc.date.created2021-02-08-
dc.date.issued2018-08-16-
dc.identifier.citation27th USENIX Security Symposium (Security '18), pp.745 - 761-
dc.identifier.urihttp://hdl.handle.net/10203/280626-
dc.description.abstractRecently, hybrid fuzzing has been proposed to address the limitations of fuzzing and concolic execution by combining both approaches. The hybrid approach has shown its effectiveness in various synthetic benchmarks such as DARPA Cyber Grand Challenge (CGC) binaries, but it still suffers from scaling to find bugs in complex, real-world software. We observed that the performance bottleneck of the existing concolic executor is the main limiting factor for its adoption beyond a small-scale study. To overcome this problem, we design a fast concolic execution engine, called QSYM, to support hybrid fuzzing. The key idea is to tightly integrate the symbolic emulation with the native execution using dynamic binary translation, making it possible to implement more fine-grained, so faster, instruction-level symbolic emulation. Additionally, QSYM loosens the strict soundness requirements of conventional concolic executors for better performance, yet takes advantage of a faster fuzzer for validation, providing unprecedented opportunities for performance optimizations, e.g., optimistically solving constraints and pruning uninteresting basic blocks. Our evaluation shows that QSYM does not just outperform state-of-the-art fuzzers (i.e., found 14× more bugs than VUzzer in the LAVA-M dataset, and outperformed Driller in 104 binaries out of 126), but also found 13 previously unknown security bugs in eight real-world programs like Dropbox Lepton, ffmpeg, and OpenJPEG, which have already been intensively tested by the state-of-the-art fuzzers, AFL and OSS-Fuzz.-
dc.languageEnglish-
dc.publisherUSENIX Association-
dc.titleQSYM: A practical concolic execution engine tailored for hybrid fuzzing-
dc.typeConference-
dc.identifier.wosid000485139900044-
dc.identifier.scopusid2-s2.0-85064167069-
dc.type.rimsCONF-
dc.citation.beginningpage745-
dc.citation.endingpage761-
dc.citation.publicationname27th USENIX Security Symposium (Security '18)-
dc.identifier.conferencecountryUS-
dc.identifier.conferencelocationBaltimore-
dc.contributor.localauthorInsu Yun-
dc.contributor.nonIdAuthorSangho Lee-
dc.contributor.nonIdAuthorMeng Xu-
dc.contributor.nonIdAuthorYeongjin Jang-
dc.contributor.nonIdAuthorTaesoo Kim-
Appears in Collection
EE-Conference Papers(학술회의논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 283 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0