Chinese Journal of Network and Information Security ›› 2023, Vol. 9 ›› Issue (2): 132-142.doi: 10.11959/j.issn.2096-109x.2023027

• Papers • Previous Articles     Next Articles

High-performance directional fuzzing scheme based on deep reinforcement learning

Tian XIAO1, Zhihao JIANG1,2, Peng TANG1, Zheng HUANG1, Jie GUO1, Weidong QIU1   

  1. 1 School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China
    2 Columbia University, New York 10027, America
  • Revised:2023-03-02 Online:2023-04-25 Published:2023-04-01
  • Supported by:
    The National Natural Science Foundation of China(61972249)

Abstract:

With the continuous growth and advancement of the Internet and information technology, continuous growth and advancement of the Internet and information technology.Nevertheless, these applications’ vulnerabilities pose a severe threat to information security and users’ privacy.Fuzzing was widely used as one of the main tools for automatic vulnerability detection due to its ease of vulnerability recurrence and low false positive errors.It generates test cases randomly and executes the application by optimization in terms of coverage or sample generation to detect deeper program paths.However, the mutation operation in fuzzing is blind and tends to make the generated test cases execute the same program path.Consequently, traditional fuzzing tests have problems such as low efficiency, high randomness of inputs generation and limited pertinence of the program structure.To address these problems, a directional fuzzing based on deep reinforcement learning was proposed, which used deep reinforcement learning networks with information obtained by staking program to guide the selection of the inputs.Besides, it enabled fast approximation and inspection of the program paths that may exist vulnerabilities.The experimental results showed that the proposed approach had better performance than the popular fuzzing tools such as AFL and AFLGO in terms of vulnerability detection and recurrence on the LAVA-M dataset and real applications like LibPNG and Binutils.Therefore, the approach can provide support for further vulnerability mining and security research.

Key words: vulnerability mining, fuzzing test, deep reinforcement learning, program path

CLC Number: 

No Suggested Reading articles found!