skip to main content
10.1145/3507971.3507977acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccipConference Proceedingsconference-collections
research-article

MOAFL: Potential Seed Selection with Multi-Objective Particle Swarm Optimization

Authors Info & Claims
Published:07 March 2022Publication History

ABSTRACT

Fuzzing has become one of the most widely used technology for discovering software vulnerabilities thanks to its effectiveness. However, even the state-of-the-art fuzzers are not very efficient at identifying promising seeds. Coverage-guided fuzzers like American Fuzzy Lop (AFL) usually employ single criterion to evaluate the quality of seeds that may pass up potential seeds. To overcome this problem, we design a potential seed selection scheme, called MOAFL. The key idea is to measure seed potential utilizing multiple objectives and prioritize promising seeds that are more likely to generate interesting seeds via mutation. More specifically, MOAFL leverages lightweight swarm intelligence techniques like Multi-Objective Particle Swarm Optimization (MOPSO) to handle multi-criteria seed selection, which allows MOAFL to choose promising seeds effectively. We implement this scheme based on AFL and our evaluations on LAVA-M dataset and 7 popular real-world programs demonstrate that MOAFL significantly increases the code coverage over AFL.

References

  1. Michal Zalewski. 2019. American Fuzzy Lop. http://lcamtuf.coredump.cx/afl/Google ScholarGoogle Scholar
  2. M. Böhme, V. Pham, and A. Roychoudhury. 2016. Coverage-based Greybox Fuzzing as Markov Chain. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS). ACM. https://doi.org/10.1145/2976749.2978428Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. S. Gan, C. Zhang, X. Qin, X. Tu, K. Li, Z. Pei, and Z. Chen. 2018. CollAFL: Path Sensitive Fuzzing. In Proceedings of the 2018 IEEE Symposium on Security and Privacy (S&P). IEEE. https://doi.org/10.1109/SP.2018.00040Google ScholarGoogle ScholarCross RefCross Ref
  4. C. Lemieux and K. Sen. 2018. FairFuzz: Targeting Rare Branches to Rapidly Increase Greybox Fuzz Testing Coverage. In Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering. ASE 2018, 475–485. https://doi.org/10.1145/3238147.3238176Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. S. Karamcheti, G. Mann, and D. Rosenberg. 2018. Adaptive Grey-Box Fuzz-Testing with Thompson Sampling. In Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security. ACM, 37-47. https://doi.org/10.1145/3270101.3270108Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. C. Lyu, S. Ji, C. Zhang, Y. Li, W. Lee, Y. Song, and R. Beyah. 2019. MOPT: Optimized Mutation Scheduling for Fuzzers. In Proceedings of 28th USENIX Security Symposium. USENIX.Google ScholarGoogle Scholar
  7. J. Wang, B. Chen, L. Wei, and Y. Liu. 2017. Skyfire: Data-driven Seed Generation for Fuzzing. In Proceedings of the 2017 IEEE Symposium on Security and Privacy (S&P). IEEE. https://doi.org/10.1109/SP.2017.23Google ScholarGoogle ScholarCross RefCross Ref
  8. P. Godefroid, H. Peleg, and R. Singh. 2017. Learn&fuzz: Machine learning for input fuzzing. In Proceedings of 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE/ACM, 50-59. https://doi.org/10.1109/ASE.2017.8115618Google ScholarGoogle Scholar
  9. C. Aschermann, T. Frassetto, T. Holz, P. Jauernig, A.-R. Sadeghi, and D. Teuchert. 2019. NAUTILUS: Fishing for Deep Bugs with Grammars. In Proceedings of 2019 Network and Distributed System Security Symposium. https://doi.org/10.14722/ndss.2019.23412Google ScholarGoogle ScholarCross RefCross Ref
  10. S. Rawat, V. Jain, A. Kumar, L. Cojocar, C. Giuffrida, and H. Bos. 2017. VUzzer: Application-aware Evolutionary Fuzzing. In Proceedings of the 2017 Annual Network and Distributed System Security Symposium (NDSS). http://doi.org/10.14722/ndss.2017.23404Google ScholarGoogle ScholarCross RefCross Ref
  11. W. Wang, H. Sun, and Q. Zeng. 2016. Seededfuzz: Selecting and generating seeds for directed fuzzing. In 10th International Symposium on Theoretical Aspects of Software Engineering (TASE), 49–56. https://doi.org/10.1109/TASE.2016.15Google ScholarGoogle Scholar
  12. B. Dolan-Gavitt, P. Hulin, E. Kirda, T. Leek, A. Mambretti, W. Robertson, F. Ulrich, and R. Whelan. 2016. Lava: Large-scale automated vulnerability addition. In Proceedings of the 2016 IEEE Symposium on Security and Privacy (S&P). IEEE. https://doi.org/10.1109/SP.2016.15Google ScholarGoogle ScholarCross RefCross Ref
  13. C. A. C. Coello, G. T. Pulido and M. S. Lechuga. 2004. Handling multiple objectives with particle swarm optimization. In IEEE Transactions on Evolutionary Computation, 256-279. https://doi.org/10.1109/TEVC.2004.82606Google ScholarGoogle ScholarCross RefCross Ref

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICCIP '21: Proceedings of the 7th International Conference on Communication and Information Processing
    December 2021
    252 pages
    ISBN:9781450385190
    DOI:10.1145/3507971

    Copyright © 2021 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 7 March 2022

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    Overall Acceptance Rate61of301submissions,20%
  • Article Metrics

    • Downloads (Last 12 months)18
    • Downloads (Last 6 weeks)1

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format