ct-fuzz: Fuzzing for Timing Leaks

2020 IEEE 13th International Conference on Software Testing, Validation and Verification (ICST)(2020)

引用 26|浏览2
暂无评分
摘要
Testing-based methodologies like fuzzing are able to analyze complex software which is not amenable to traditional formal approaches like verification, model checking, and abstract interpretation. Despite enormous success a texposing countless security vulnerabilities in many popular software projects, applications of testing-based approaches mainly targeted checking traditional safety properties like memory safety. While unquestionably important, this class of properties does not precisely characterize other important security aspects such as information leakage, e.g., through side channels. In this work we extend testing-based software analysis methodologies to two-safety properties, which enables the precise discovery of information leaks in complex software. In particular, we present the ct-fuzz tool, which lends coverage-guided grey box fuzzers the ability to detect two safety property violations. Our approach is capable of exposing violations to any two-safety property expressed a sequality between two program traces. Empirically, we demonstrate that ct-fuzz swiftly reveals timing leaks in popular cryptographic implementations.
更多
查看译文
关键词
texposing countless security vulnerabilities,popular software projects,testing-based approaches,traditional safety properties,memory safety,important security aspects,testing-based software analysis methodologies,two-safety property,precise discovery,information leaks,complex software,ct-fuzz tool,coverage-guided grey box,safety property violations,timing leaks,fuzzing,traditional formal approaches,model checking,abstract interpretation,enormous success
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要