Configuration Fuzzing for Software Vulnerability Detection.

Proc Int Conf Availab Reliab Secur

Published: February 2010

Many software security vulnerabilities only reveal themselves under certain conditions, i.e., particular configurations of the software together with its particular runtime environment. One approach to detecting these vulnerabilities is fuzz testing, which feeds a range of randomly modified inputs to a software application while monitoring it for failures. However, typical fuzz testing makes no guarantees regarding the syntactic and semantic validity of the input, or of how much of the input space will be explored. To address these problems, in this paper we present a new testing methodology called configuration fuzzing. Configuration fuzzing is a technique whereby the configuration of the running application is randomly modified at certain execution points, in order to check for vulnerabilities that only arise in certain conditions. As the application runs in the deployment environment, this testing technique continuously fuzzes the configuration and checks "security invariants" that, if violated, indicate a vulnerability; however, the fuzzing is performed in a duplicated copy of the original process, so that it does not affect the state of the running application. In addition to discussing the approach and describing a prototype framework for implementation, we also present the results of a case study to demonstrate the approach's efficiency.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3057938PMC
http://dx.doi.org/10.1109/ares.2010.22DOI Listing

Publication Analysis

Top Keywords

configuration fuzzing
12
fuzz testing
8
randomly modified
8
running application
8
configuration
5
software
4
fuzzing software
4
software vulnerability
4
vulnerability detection
4
detection software
4

Similar Publications

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!