TY - GEN
T1 - SulleyEX
T2 - 11th International Conference on Network and System Security, NSS 2017
AU - Ma, Rui
AU - Zhu, Tianbao
AU - Hu, Changzhen
AU - Shan, Chun
AU - Zhao, Xiaolin
N1 - Publisher Copyright:
© Springer International Publishing AG 2017.
PY - 2017
Y1 - 2017
N2 - Fuzzing has become one of the most important technologies in the field of network security, and fuzzer also has become an important tool for discovering network vulnerabilities. But for the stateful network protocol fuzzing, most of fuzzers could not effectively cover the state trajectory, and not achieve a good automation. Aiming at the above issues, this paper designs a fuzzer named SulleyEX based on the open source project Sulley. Firstly, the SulleyEX uses finite-state machine to describe the state trajectory of stateful network protocol and further generates sessions automatically. That dramatically enhances the automation of Sulley session management module. In order to improve the optional ability of the fuzzer, the SulleyEX could automatically extract the protocol format based on Sulley’s data presentation module as well as provide an interface to custom fuzz testing data generation algorithm. Comparing with the traditional Sulley, the experimental results highlight that the SulleyEX could successfully discover the same vulnerability, while the SulleyEX achieves higher automation.
AB - Fuzzing has become one of the most important technologies in the field of network security, and fuzzer also has become an important tool for discovering network vulnerabilities. But for the stateful network protocol fuzzing, most of fuzzers could not effectively cover the state trajectory, and not achieve a good automation. Aiming at the above issues, this paper designs a fuzzer named SulleyEX based on the open source project Sulley. Firstly, the SulleyEX uses finite-state machine to describe the state trajectory of stateful network protocol and further generates sessions automatically. That dramatically enhances the automation of Sulley session management module. In order to improve the optional ability of the fuzzer, the SulleyEX could automatically extract the protocol format based on Sulley’s data presentation module as well as provide an interface to custom fuzz testing data generation algorithm. Comparing with the traditional Sulley, the experimental results highlight that the SulleyEX could successfully discover the same vulnerability, while the SulleyEX achieves higher automation.
KW - Finite state machine
KW - Fuzzer
KW - Stateful network protocol
KW - Vulnerability discovering
UR - http://www.scopus.com/inward/record.url?scp=85028473147&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-64701-2_26
DO - 10.1007/978-3-319-64701-2_26
M3 - Conference contribution
AN - SCOPUS:85028473147
SN - 9783319647005
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 359
EP - 372
BT - Network and System Security - 11th International Conference, NSS 2017, Proceedings
A2 - Yan, Zheng
A2 - Molva, Refik
A2 - Mazurczyk, Wojciech
A2 - Kantola, Raimo
PB - Springer Verlag
Y2 - 21 August 2017 through 23 August 2017
ER -