Fuzz to the Future: Uncovering Occluded Future Vulnerabilities via Robust Fuzzing

Arvind S. Raj, Wil Gibbs, Fangzhou Dong, Jayakrishna Menon Vadayath, Michael Tompkins, Steven Wirsz, Yibo Liu, Zhenghao Hu, Chang Zhu, Gokulkrishna Praveen Menon, Brendan Dolan-Gavitt, Adam Doupé, Ruoyu Wang, Yan Shoshitaishvili, Tiffany Bao

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    The security landscape of software systems has witnessed considerable advancements through dynamic testing methodologies, especially fuzzing. Traditionally, fuzzing involves a sequential, cyclic process where software is tested to identify crashes. These crashes are then triaged and patched, leading to subsequent cycles that uncover further vulnerabilities. While effective, this method is not efficient as each cycle potentially reveals new issues previously obscured by earlier crashes, thus resulting in vulnerabilities being discovered sequentially. In this paper, we present a solution to identify occluded future vulnerabilities — vulnerabilities that are hard or impossible to trigger due to current vulnerabilities occluding the triggering path. We introduce robust fuzzing, a novel technique that enables fuzzers probe beyond the immediate crash location and uncover new vulnerabilities or variants of known ones. We implemented robust fuzzing in FlakJack, a pioneering fuzzing add-on that leverages binary patching to proactively identify occluded future vulnerabilities hidden behind current crashes. By enabling fuzzers to bypass immediate crash points and delve deeper into the software, FlakJack not only accelerates the vulnerability discovery process but also significantly enhances the efficacy of software testing. With the help of FlakJack, we found 28 new vulnerabilities in projects that have been extensively tested through the OSS-Fuzz project. This approach promises a transformative shift in how vulnerabilities are identified and managed, aiming to shorten the time span of vulnerability discovery over the long term.

    Original languageEnglish (US)
    Title of host publicationCCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security
    PublisherAssociation for Computing Machinery, Inc
    Pages3719-3733
    Number of pages15
    ISBN (Electronic)9798400706363
    DOIs
    StatePublished - Dec 9 2024
    Event31st ACM SIGSAC Conference on Computer and Communications Security, CCS 2024 - Salt Lake City, United States
    Duration: Oct 14 2024Oct 18 2024

    Publication series

    NameCCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security

    Conference

    Conference31st ACM SIGSAC Conference on Computer and Communications Security, CCS 2024
    Country/TerritoryUnited States
    CitySalt Lake City
    Period10/14/2410/18/24

    Keywords

    • Binary Analysis
    • Fuzzing
    • Software Security

    ASJC Scopus subject areas

    • Computer Networks and Communications
    • Computer Science Applications
    • Software

    Fingerprint

    Dive into the research topics of 'Fuzz to the Future: Uncovering Occluded Future Vulnerabilities via Robust Fuzzing'. Together they form a unique fingerprint.

    Cite this