Back to Search Start Over

Vulnerability Detection in SIoT Applications: A Fuzzing Method on their Binaries

Authors :
Alireza Jolfaei
Seyit Camtepe
Mohammad Sayadhaghighi
Sheng Wen
Xiaogang Zhu
Yang Xiang
Source :
IEEE Transactions on Network Science and Engineering. 9:970-979
Publication Year :
2022
Publisher :
Institute of Electrical and Electronics Engineers (IEEE), 2022.

Abstract

SIoT enables devices to communicate with each other automatically, which is not reliable when applications in SIoT are vulnerable. To improve the security of SIoT, different techniques have been employed so far, mainly to detect vulnerabilities in SIoT applications. Among the detection techniques, fuzzing is one of the most effective ones that can significantly improve the security of SIoT applications. However, the existing fuzzing methods have three problems. First of all, the schemes to instrument target binaries cause high memory overhead because they instrument at all edges to obtain the coverage information. Moreover, they introduce a severe problem called edge collision, i.e., two different edges are deemed the same during fuzzing. Thirdly, none of the existing fuzzers conduct fuzzing using path coverage because path coverage has high memory overhead. In this paper, we propose BECFuzz to resolve the above three problems. BECFuzz instruments at specific edges, and conducts fuzzing based on both edge coverage and path coverage, which greatly improves its effectiveness. We implement our BECFuzz based on two typical fuzzers which are widely recognised as baselines, AFL and AFLFast, and run experiments on 18 real-world programs. The results demonstrate that our method suppresses the state-of-art fuzzers in performance.

Details

ISSN :
2334329X
Volume :
9
Database :
OpenAIRE
Journal :
IEEE Transactions on Network Science and Engineering
Accession number :
edsair.doi...........3ada056b391601ab82f3c12444d456ba