Journal of Xidian University ›› 2024, Vol. 51 ›› Issue (2): 126-136.doi: 10.19665/j.issn1001-2400.20230901

• Computer Science and Technology & Cyberspace Security • Previous Articles     Next Articles

Efficient seed generation method for software fuzzing

LIU Zhenyan1(), ZHANG Hua1(), LIU Yong2(), YANG Libo3(), WANG Mengdi4()   

  1. 1. State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications,Beijing 100876,China
    2. School of Information Science and Technology,Qingdao University of Science and Technology,Qingdao266061,China
    3. State Grid Hebei Power Company,Shijiazhuang050000,China
    4. State Grid Hebei Information & Telecommunication Branch,Shijiazhuang 050000,China
  • Received:2023-01-10 Online:2024-04-20 Published:2023-10-07
  • Contact: ZHANG Hua E-mail:zhyliu@bupt.edu.cn;zhanghua_288@bupt.edu.cn;liuyong020202@163.com;ylb@he.sgcc.com.cn;xtgs_wangmd@he.sgcc.com.cn

Abstract:

As one of the effective ways to exploit software vulnerabilities in the current software engineering field,fuzzing plays a significant role in discovering potential software vulnerabilities.The traditional seed selection strategy in fuzzing cannot effectively generate high-quality seeds,which results in the testcases generated by mutation being unable to reach deeper paths and trigger more security vulnerabilities.To address these challenges,a seed generation method for efficient fuzzing based on the improved generative adversarial network(GAN) is proposed which can flexibly expand the type of seed generation through encoding and decoding technology and significantly improve the fuzzing performance of most applications with different input types.In experiments,the seed generation strategy adopted in this paper significantly improved the coverage and unique crashes,and effectively increased the seed generation speed.Six open-sourced programs with different highly-structured inputs were selected to demonstrate the effectiveness of our strategy.As a result,the average branch coverage increased by 2.79%,the number of paths increased by 10.35% and additional 86.92% of unique crashes were found compared to the original strategy.

Key words: vulnerability detection, network security, fuzz testing, deep learning

CLC Number: 

  • TP311