File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1016/j.cose.2022.102889
- Scopus: eid_2-s2.0-85137572513
- Find via
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Article: AFLIoT: Fuzzing on linux-based IoT device with binary-level instrumentation
Title | AFLIoT: Fuzzing on linux-based IoT device with binary-level instrumentation |
---|---|
Authors | |
Keywords | Binary-level Daemon analysis Greybox fuzzing Internet of things On-device |
Issue Date | 2022 |
Citation | Computers and Security, 2022, v. 122, article no. 102889 How to Cite? |
Abstract | In recent years, coverage-guided greybox fuzzing has demonstrated its efficiency in detecting security vulnerabilities on traditional devices. Instrumentation information plays a significant role in sophisticated greybox fuzzer such as American Fuzzing Lop to directionally improve coverage and distill seeds. While open-source programs leverage wrapped assemblers to glean instrumentation information, closed-source programs can utilize the emulation-based instrumentation for coverage-guided fuzzing. The pervasiveness of the closed source puts a strong demand for emulation instrumentation. However, the required access to peripherals brings great difficulty in fuzzing on the emulator, especially for those various IoT devices. This paper presents AFLIoT, the first generic on-device fuzzing framework for Linux-based IoT binary programs. By leveraging offset-free binary-level instrumentation, binary programs can avoid unnecessarily rewriting, inherit compatibility of peripherals, and be executed directly on IoT devices by AFLIoT. We evaluate AFLIoT on multiple benchmarks with real-world IoT programs. AFLIoT identified 437 unique crashes in 13 binary programs, including 95 newly confirmed unique crashes. Those crashes demonstrate that AFLIoT is efficient and effective in detecting potential software bugs in binary programs on Linux-based IoT devices. |
Persistent Identifier | http://hdl.handle.net/10722/346837 |
ISSN | 2023 Impact Factor: 4.8 2023 SCImago Journal Rankings: 1.566 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Du, Xuechao | - |
dc.contributor.author | Chen, Andong | - |
dc.contributor.author | He, Boyuan | - |
dc.contributor.author | Chen, Hao | - |
dc.contributor.author | Zhang, Fan | - |
dc.contributor.author | Chen, Yan | - |
dc.date.accessioned | 2024-09-17T04:13:35Z | - |
dc.date.available | 2024-09-17T04:13:35Z | - |
dc.date.issued | 2022 | - |
dc.identifier.citation | Computers and Security, 2022, v. 122, article no. 102889 | - |
dc.identifier.issn | 0167-4048 | - |
dc.identifier.uri | http://hdl.handle.net/10722/346837 | - |
dc.description.abstract | In recent years, coverage-guided greybox fuzzing has demonstrated its efficiency in detecting security vulnerabilities on traditional devices. Instrumentation information plays a significant role in sophisticated greybox fuzzer such as American Fuzzing Lop to directionally improve coverage and distill seeds. While open-source programs leverage wrapped assemblers to glean instrumentation information, closed-source programs can utilize the emulation-based instrumentation for coverage-guided fuzzing. The pervasiveness of the closed source puts a strong demand for emulation instrumentation. However, the required access to peripherals brings great difficulty in fuzzing on the emulator, especially for those various IoT devices. This paper presents AFLIoT, the first generic on-device fuzzing framework for Linux-based IoT binary programs. By leveraging offset-free binary-level instrumentation, binary programs can avoid unnecessarily rewriting, inherit compatibility of peripherals, and be executed directly on IoT devices by AFLIoT. We evaluate AFLIoT on multiple benchmarks with real-world IoT programs. AFLIoT identified 437 unique crashes in 13 binary programs, including 95 newly confirmed unique crashes. Those crashes demonstrate that AFLIoT is efficient and effective in detecting potential software bugs in binary programs on Linux-based IoT devices. | - |
dc.language | eng | - |
dc.relation.ispartof | Computers and Security | - |
dc.subject | Binary-level | - |
dc.subject | Daemon analysis | - |
dc.subject | Greybox fuzzing | - |
dc.subject | Internet of things | - |
dc.subject | On-device | - |
dc.title | AFLIoT: Fuzzing on linux-based IoT device with binary-level instrumentation | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1016/j.cose.2022.102889 | - |
dc.identifier.scopus | eid_2-s2.0-85137572513 | - |
dc.identifier.volume | 122 | - |
dc.identifier.spage | article no. 102889 | - |
dc.identifier.epage | article no. 102889 | - |