Authors:
Marcello Maugeri
1
;
Cristian Daniele
2
;
Giampaolo Bella
1
and
Erik Poll
2
Affiliations:
1
Department of Maths and Computer Science, University of Catania, Catania, Italy
;
2
Department of Digital Security, Radboud University, Nijmegen, The Netherlands
Keyword(s):
Fuzzing, Fork, Security Testing, Software Security.
Abstract:
Fuzz testing (or fuzzing) is an effective technique used to find security vulnerabilities. It consists of feeding a software under test with malformed inputs, waiting for a weird system behaviour (often a crash of the system). Over the years, different approaches have been developed, and among the most popular lies the coverage-based one. It relies on the instrumentation of the system to generate inputs able to cover as much code as possible. The success of this approach is also due to its usability as fuzzing techniques research approaches that do not require (or only partial require) human interactions. Despite the efforts, devising a fully-automated fuzzer still seems to be a challenging task. Target systems may be very complex; they may integrate cryptographic primitives, compute and verify check-sums and employ forks to enhance the system security, achieve better performances or manage different connections at the same time. This paper introduces the fork-awareness property to e
xpress the fuzzer ability to manage systems using forks. This property is leveraged to evaluate 14 of the most widely coverage-guided fuzzers and highlight how current fuzzers are ineffective against systems using forks.
(More)