Fuzzing is a simple and popular technique that has been widely used to detect vulnerabilities in software. However, due to its blind mutation, fuzzing brings many limitations. First, it is difficult for fuzzing to pass the sanity checks, which makes fuzzing unable to target vulnerability or crash locations effectively. Secondly, blind mutation limits the diversity of seed generation and makes it difficult for the fuzzing process to achieve convergence. In this paper, we propose a direction sensitive fuzzing solution AFLPro. On the one hand, it focuses on seed selection, using a new fuzzing scheme based on Basic Block Aggregation (BBA), which reduces the possibility of seed selection in the wrong direction. By applying a multi-dimensional oriented seed selection strategy, it achieves fine-grained seed selection. On the other hand, based on biological evolution, AFLPro optimizes genetic variation to ensure the diversity of seed varieties and the convergence of fuzzing tests. Besides, AFLPro also incorporates lightweight static analysis to obtain information about the target program (this paper only studies closed source programs), providing complete semantic guidance for fuzzing through resource integration. We implemented a prototype of AFLPro based on the popular fuzzer AFL. We evaluated it on three datasets: DARPA Grand Challenges (CGC), LAVA-M dataset, and a set of real-world applications. The results show that in 92% of all three datasets, AFLPro exhibits better vulnerability detection capabilities than all of the state-of-the-art fuzzers mentioned in this paper.

Additional Metadata
Keywords Automated binary fuzzing, Basic block aggregation, Direction sensitive fuzzing, Seed energy scheduling, Seed selection, Static analysis
Persistent URL dx.doi.org/10.1016/j.jisa.2020.102497
Journal Journal of Information Security and Applications
Citation
Ji, T. (Tiantian), Wang, Z. (Zhongru), Tian, Z. (Zhihong), Fang, B. (Binxing), Ruan, Q. (Qiang), Wang, H. (Haichen), & Shi, W. (2020). AFLPro: Direction sensitive fuzzing. Journal of Information Security and Applications, 54. doi:10.1016/j.jisa.2020.102497