LBRY Block Explorer

LBRY Claims • follow-the-white-rabbit-simplifying-fuzz

3f84edbf7d0fa03d49c589be1ee5fa696e683094

Published By
Created On
2 Sep 2020 11:40:29 UTC
Transaction ID
Cost
Safe for Work
Free
Yes
Follow the White Rabbit Simplifying Fuzz Testing Using FuzzExMachina
Black Hat USA 2018
Setting up a fuzzing pipeline takes time and manual effort for identifying fuzzable programs and configuring the fuzzer.
Usually only large software projects with dedicated testing teams at their disposal are equipped to use fuzz testing in their Security Development Lifecycle. Other projects with limited resources cannot easily use this effective technique in their SDL. This renders the software landscape unnecessarily insecure. Especially less popular software applications are not being fuzzed due to a lack of resources and easy to use tooling.

Lowering the required skill level and effort to set up a fuzzing pipeline therefore results in a significant increase of today's software's security. To tackle this challenge, we developed an easy to use framework, FuzzExMachina (FExM), that reduces manual effort to a minimum.

Using clever input inference methods and containerization, we automate the fuzzing pipeline from start to end in a scalable fashion. We support acquiring binaries from a variety of sources, including blackbox binaries and source code repositories.
In cases for which FExM cannot automatically achieve a high coverage, it drops users to a novel AFL mode, "Afl-TimeWarp", in which they can set up testcases without the need to alter or understand the underlying code. AFL-TimeWarp mode allows to fuzz deeper program states without writing a single line of code, fitting FExM's philosophy to keep it simple for users.

To test the viability of our framework, we fuzzed over one hundred packages from the Arch Linux package repository with essentially zero effort. After only a few days, we already found 11 crashes, six of which were exploitable. This shows how FExM permits automated distributed fuzzing of applications; crash exploitability classification; and is equipped with a web front end for navigating security issues in a convenient way. Our work automatically retrofits fuzzing into the security development lifecycle.
...
https://www.youtube.com/watch?v=xtXa21oM__Y
Author
Content Type
Unspecified
video/mp4
Language
Unspecified
Open in LBRY

More from the publisher

Controlling
VIDEO
BLACK
Controlling
VIDEO
BLACK
Controlling
VIDEO
31C3
Controlling
VIDEO
DEF C
Controlling
VIDEO
[LINU
Controlling
VIDEO
BLACK
Controlling
VIDEO
DEF C
Controlling
VIDEO
[SIGI
Controlling
VIDEO
32C3