total 1347 targets as known and 3153 unknown. Fi-
nally, AV-AFL is able to show the known status for
641 extra targets in comparison to AFL.
The main drawback of AFL remains its inability
to distinguish and segregate the unreachable vulnera-
bilities from the group of vulnerabilities. We have ex-
perimentally proven that the AV-AFL overcomes this
inability successfully by alarming only the reachable
vulnerabilities. It has been observed through results
that the performance of AV-AFL for the same time
period is highly improved in comparison to AFL due
to reduced search space.
6 CONCLUSION
The AV-AFL approach presented in this paper facili-
ties the smart detection of crashes by eliminating the
unreachable targets by the fuzzing mechanism. It has
been observed from the literature of the fuzzing do-
main that vulnerability detection is a forever running
process. Use of fuzzing enables us to detect the vul-
nerabilities so that attackers may not misuse them to
exploit the system. But, this detection will continue
because of the unknown status of the vulnerabilities.
If fuzzer could be able to show that the vulnerabilities
it is searching for are not required and the time can
be spent on other vulnerabilities which could lead to
a crash, then the fuzzer will be efficient to perform
the fuzzing fast. AV-AFL provides this environment
using sound static analyzer Frama-C. It is experimen-
tally observed that the proposed AV-AFL detects the
vulnerabilities effectively in comparison to the base-
line AFL. In total AV-AFL shows 641 extra as known
targets in contrast to AFL. AV-AFL has better results
in total 71.11% of 45 programs. It shows that AV-
AFL is superior.
In the future, we will extend AV-AFL with a new
seed generation technique to improvise the vulnera-
bility detection process. We will try to embed the
model checker technique with AFL to prove the un-
known cases at last.
REFERENCES
Baudin, P., Bobot, F., B
¨
uhler, D., Correnson, L., Kirchner,
F., Kosmatov, N., Maroneze, A., Perrelle, V., Prevosto,
V., Signoles, J., et al. (2021). The dogged pursuit of
bug-free c programs: the frama-c software analysis
platform. Communications of the ACM, 64(8):56–68.
B
¨
ohme, M., Pham, T., Nguyen, M.-D., and Roychoudhury,
A. (2017). Directed greybox fuzzing. pages 2329–
2344.
et al., K. Evaluating fuzz testing. In Proceedings of the 2018
ACM SIGSAC Conference on Computer and Commu-
nications Security.
Godboley, S., Dutta, A., Mohapatra, D. P., Das, A., and
Mall, R. (2016). Making a concolic tester achieve in-
creased mc/dc. Innovations in systems and software
engineering, 12(4):319–332.
Godboley, S., Dutta, A., Mohapatra, D. P., and Mall, R.
(2017a). J3 model: a novel framework for improved
modified condition/decision coverage analysis. Com-
puter Standards & Interfaces, 50:1–17.
Godboley, S., Dutta, A., Mohapatra, D. P., and Mall, R.
(2018a). Gecojap: A novel source-code preprocess-
ing technique to improve code coverage. Computer
Standards & Interfaces, 55:27–46.
Godboley, S., Dutta, A., Mohapatra, D. P., and Mall, R.
(2018b). Scaling modified condition/decision cov-
erage using distributed concolic testing for java pro-
grams. Computer Standards & Interfaces, 59:61–86.
Godboley, S., Jaffar, J., Maghareh, R., and Dutta, A. (2021).
Toward optimal mc/dc test case generation. ISSTA
2021, page 505–516, New York, NY, USA. Associa-
tion for Computing Machinery.
Godboley, S., Mohapatra, D. P., Das, A., and Mall, R.
(2017b). An improved distributed concolic test-
ing approach. Software: Practice and Experience,
47(2):311–342.
Godboley, S., Sahani, A., and Mohapatra, D. P. (2015).
Abce: A novel framework for improved branch cover-
age analysis. In SCSE, pages 266–273.
Iorga, D., Corl
˘
atescu, D., Grigorescu, O., S
˘
andescu, C.,
Dasc
˘
alu, M., and Rughinis¸, R. (2020). Early detection
of vulnerabilities from news websites using machine
learning models. In RoEduNet, pages 1–6. IEEE.
Kiss, B., Kosmatov, N., Pariente, D., and Puccetti, A.
(2015). Combining static and dynamic analyses for
vulnerability detection: Illustration on heartbleed. In
Piterman, N., editor, Hardware and Software: Verifi-
cation and Testing, pages 39–50, Cham. Springer.
RERS (2019a). RERS19:Industrial Reachability Prob-
lems. http://rers-challenge.org/2019/index.php?page=
industrialProblemsReachability.
RERS (2019b). RERS19:Sequential Reachability Prob-
lems. http://rers-challenge.org/2019/index.php?page=
reachProblems.
RERS (2020). RERS20:Sequential Reachability Prob-
lems. http://rers-challenge.org/2020/index.php?page=
reachProblems.
Rustamov, F. e. a. (2021). Bugminer: Mining the hard-
to-reach software vulnerabilities through the target-
oriented hybrid fuzzer. Electronics, 10(1).
Shastry, B. e. a. (2017). Static program analysis as a
fuzzing aid. In International Symposium on Research
in Attacks, Intrusions, and Defenses, pages 26–47.
Springer.
Signoles, J. (2021). The e-acsl perspective on runtime as-
sertion checking. VORTEX 2021, page 8–12. Associ-
ation for Computing Machinery.
ENASE 2022 - 17th International Conference on Evaluation of Novel Approaches to Software Engineering
308