File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1007/978-3-030-63086-7_20
- Scopus: eid_2-s2.0-85098248915
- Find via
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Integrity: Finding integer errors by targeted fuzzing
Title | Integrity: Finding integer errors by targeted fuzzing |
---|---|
Authors | |
Keywords | Fuzzing Integer errors Software security |
Issue Date | 2020 |
Citation | Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, 2020, v. 335, p. 360-380 How to Cite? |
Abstract | Integer arithmetic errors are a major source of software vulnerabilities. Since they rarely cause crashes, they are unlikely found by fuzzers without special techniques to trigger them. We design and implement Integrity, which finds integer errors using fuzzing. Our key contribution is that, by targeted instrumentation, we empower fuzzers with the ability to trigger integer errors. In our evaluation, Integrity found all the integer errors in the Juliet test suite with no false positive. On 9 popular open source programs, Integrity found a total of 174 true errors, including 8 crashes and 166 non-crashing errors. A major challenge during error review was how to determine if a non-crashing error was harmful. While solving this problem precisely is challenging because it depends on the semantics of the program, we propose two methods to find potentially harmful errors, based on the statistics of traces produced by the fuzzer and on comparing the output of independent implementations of the same algorithm. Our evaluation demonstrated that Integrity is effective in finding integer errors. |
Persistent Identifier | http://hdl.handle.net/10722/346979 |
ISSN | 2023 SCImago Journal Rankings: 0.160 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Rong, Yuyang | - |
dc.contributor.author | Chen, Peng | - |
dc.contributor.author | Chen, Hao | - |
dc.date.accessioned | 2024-09-17T04:14:33Z | - |
dc.date.available | 2024-09-17T04:14:33Z | - |
dc.date.issued | 2020 | - |
dc.identifier.citation | Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, 2020, v. 335, p. 360-380 | - |
dc.identifier.issn | 1867-8211 | - |
dc.identifier.uri | http://hdl.handle.net/10722/346979 | - |
dc.description.abstract | Integer arithmetic errors are a major source of software vulnerabilities. Since they rarely cause crashes, they are unlikely found by fuzzers without special techniques to trigger them. We design and implement Integrity, which finds integer errors using fuzzing. Our key contribution is that, by targeted instrumentation, we empower fuzzers with the ability to trigger integer errors. In our evaluation, Integrity found all the integer errors in the Juliet test suite with no false positive. On 9 popular open source programs, Integrity found a total of 174 true errors, including 8 crashes and 166 non-crashing errors. A major challenge during error review was how to determine if a non-crashing error was harmful. While solving this problem precisely is challenging because it depends on the semantics of the program, we propose two methods to find potentially harmful errors, based on the statistics of traces produced by the fuzzer and on comparing the output of independent implementations of the same algorithm. Our evaluation demonstrated that Integrity is effective in finding integer errors. | - |
dc.language | eng | - |
dc.relation.ispartof | Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST | - |
dc.subject | Fuzzing | - |
dc.subject | Integer errors | - |
dc.subject | Software security | - |
dc.title | Integrity: Finding integer errors by targeted fuzzing | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1007/978-3-030-63086-7_20 | - |
dc.identifier.scopus | eid_2-s2.0-85098248915 | - |
dc.identifier.volume | 335 | - |
dc.identifier.spage | 360 | - |
dc.identifier.epage | 380 | - |