【24h】

Script Fuzzing with an Attacker's Mind-Set

机译:攻击者思维定势的脚本模糊测试

获取原文

摘要

Attackers primarily target memory corruption vulnerabilities inside script engine-hosting application, e.g. web browsers or most PDF viewers. Such applications are widely popular, and the discovery of vulnerabilities made by attackers ahead of security researchers diminishes the trustworthiness of their deployment. Typically, fuzzers are employed to generate unexpected inputs, with the aim of crashing applications and exposing errors. State-of-the-art fuzzers produce random byte sequences that comply with file/protocol formats. In the case of script fuzzers, random inputs need to constitute strings that are parse-able statements with respect to the scripting language used. However, focusing solely on syntax-based randomness does not reflect the attacker's mind-set, as generated inputs are not optimized for narrowing in on vulnerabilities. A demand exists for smarter fuzzers in order to accelerate the process of finding exploitable errors.
机译:攻击者主要针对脚本引擎托管应用程序内部的内存损坏漏洞,例如网络浏览器或大多数PDF查看器。这样的应用程序非常流行,并且攻击者在安全研究人员之前发现漏洞的做法削弱了部署的可信度。通常,模糊器用于生成意外的输入,目的是使应用程序崩溃并暴露错误。最先进的模糊器产生符合文件/协议格式的随机字节序列。在脚本模糊测试的情况下,随机输入需要构成字符串,这些字符串相对于所使用的脚本语言是可解析的语句。但是,仅关注基于语法的随机性并不能反映攻击者的思维定势,因为生成的输入并未针对缩小漏洞进行优化。为了加快发现可利用错误的过程,人们需要更智能的模糊器。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号