Back to Search
Start Over
ESRFuzzer: an enhanced fuzzing framework for physical SOHO router devices to discover multi-Type vulnerabilities
- Source :
- Cybersecurity, Vol 4, Iss 1, Pp 1-22 (2021)
- Publication Year :
- 2021
- Publisher :
- Springer Science and Business Media LLC, 2021.
-
Abstract
- SOHO (small office/home office) routers provide services for end devices to connect to the Internet, playing an important role in cyberspace. Unfortunately, security vulnerabilities pervasively exist in these routers, especially in the web server modules, greatly endangering end users. To discover these vulnerabilities, fuzzing web server modules of SOHO routers is the most popular solution. However, its effectiveness is limited due to the lack of input specification, lack of routers’ internal running states, and lack of testing environment recovery mechanisms. Moreover, existing works for device fuzzing are more likely to detect memory corruption vulnerabilities.In this paper, we propose a solution ESRFuzzer to address these issues. It is a fully automated fuzzing framework for testing physical SOHO devices. It continuously and effectively generates test cases by leveraging two input semantic models, i.e., KEY-VALUE data model and CONF-READ communication model, and automatically recovers the testing environment with power management. It also coordinates diversified mutation rules with multiple monitoring mechanisms to trigger multi-type vulnerabilities. With the guidance of the two semantic models, ESRFuzzer can work in two ways: general mode fuzzing and D-CONF mode fuzzing. General mode fuzzing can discover both issues which occur in the CONF and READ operation, while D-CONF mode fuzzing focus on the READ-op issues especially missed by general mode fuzzing.We ran ESRFuzzer on 10 popular routers across five vendors. In total, it discovered 136 unique issues, 120 of which have been confirmed as 0-day vulnerabilities we found. As an improvement of SRFuzzer, ESRFuzzer have discovered 35 previous undiscovered READ-op issues that belong to three vulnerability types, and 23 of them have been confirmed as 0-day vulnerabilities by vendors. The experimental results show that ESRFuzzer outperforms state-of-the-art solutions in terms of types and number of vulnerabilities found.
- Subjects :
- Router
IoT
Computer engineering. Computer hardware
Web server
Computer Networks and Communications
Computer science
Memory corruption
02 engineering and technology
computer.software_genre
Computer security
TK7885-7895
Artificial Intelligence
020204 information systems
0202 electrical engineering, electronic engineering, information engineering
Automatic vulnerability detection
business.industry
End user
020207 software engineering
QA75.5-76.95
Fuzz testing
Test case
Electronic computers. Computer science
Models of communication
Fuzzing
The Internet
business
computer
Software
Information Systems
Subjects
Details
- ISSN :
- 25233246
- Volume :
- 4
- Database :
- OpenAIRE
- Journal :
- Cybersecurity
- Accession number :
- edsair.doi.dedup.....62963527b117d63c360a285ca16feaf7
- Full Text :
- https://doi.org/10.1186/s42400-021-00091-9