Browser Fuzzing by Scheduled Mutation and Generation of Document Object Models

碩士 === 國立交通大學 === 網路工程研究所 === 103 === Internet applications have made our daily life fruitful. However, they also cause many security problems if these applications are leveraged by intruders. Thus, it is important to find and fix vulnerabilities timely to prevent application vulnerabilities from be...

Full description

Bibliographic Details
Main Authors: Liao, Feng-Ze, 廖峰澤
Other Authors: Lin, Ying-Dar
Format: Others
Language:en_US
Published: 2015
Online Access:http://ndltd.ncl.edu.tw/handle/34522736060995439796
id ndltd-TW-103NCTU5726026
record_format oai_dc
spelling ndltd-TW-103NCTU57260262016-07-02T04:29:14Z http://ndltd.ncl.edu.tw/handle/34522736060995439796 Browser Fuzzing by Scheduled Mutation and Generation of Document Object Models 藉由排程文件物件模型資料之變異與生成 進行瀏覽器模糊測試 Liao, Feng-Ze 廖峰澤 碩士 國立交通大學 網路工程研究所 103 Internet applications have made our daily life fruitful. However, they also cause many security problems if these applications are leveraged by intruders. Thus, it is important to find and fix vulnerabilities timely to prevent application vulnerabilities from being exploited. Fuzz testing is a popular methodology that effectively finds vulnerabilities in application programs with seed input mutation. However, it is not a satisfied solution for the web browsers. In this work, we propose a solution, called scheduled DOM fuzzing (SDF), which integrates several related browser fuzzing tools and the fuzzing framework called BFF. To explore more crash possibilities, we revise the browser fuzzing architecture and schedule seed input selection and mutation dynamically. We also propose two probability computing methods in scheduling mechanism which tries to improve the performance by determining which combinations of seed and mutation would produce more crashes. Our experiments show that SDF is 2.27 time more efficient in terms of the number of crashes and vulnerabilities found at most. SDF also has the capacity for finding 23 exploitable crashes in Windows 7 within five days. The experimental results reveals that a good scheduling method for seed and mutations in browser fuzzing is able to find more exploitable crashes than fuzzers with the fixed seed input. Lin, Ying-Dar 林盈達 2015 學位論文 ; thesis 25 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立交通大學 === 網路工程研究所 === 103 === Internet applications have made our daily life fruitful. However, they also cause many security problems if these applications are leveraged by intruders. Thus, it is important to find and fix vulnerabilities timely to prevent application vulnerabilities from being exploited. Fuzz testing is a popular methodology that effectively finds vulnerabilities in application programs with seed input mutation. However, it is not a satisfied solution for the web browsers. In this work, we propose a solution, called scheduled DOM fuzzing (SDF), which integrates several related browser fuzzing tools and the fuzzing framework called BFF. To explore more crash possibilities, we revise the browser fuzzing architecture and schedule seed input selection and mutation dynamically. We also propose two probability computing methods in scheduling mechanism which tries to improve the performance by determining which combinations of seed and mutation would produce more crashes. Our experiments show that SDF is 2.27 time more efficient in terms of the number of crashes and vulnerabilities found at most. SDF also has the capacity for finding 23 exploitable crashes in Windows 7 within five days. The experimental results reveals that a good scheduling method for seed and mutations in browser fuzzing is able to find more exploitable crashes than fuzzers with the fixed seed input.
author2 Lin, Ying-Dar
author_facet Lin, Ying-Dar
Liao, Feng-Ze
廖峰澤
author Liao, Feng-Ze
廖峰澤
spellingShingle Liao, Feng-Ze
廖峰澤
Browser Fuzzing by Scheduled Mutation and Generation of Document Object Models
author_sort Liao, Feng-Ze
title Browser Fuzzing by Scheduled Mutation and Generation of Document Object Models
title_short Browser Fuzzing by Scheduled Mutation and Generation of Document Object Models
title_full Browser Fuzzing by Scheduled Mutation and Generation of Document Object Models
title_fullStr Browser Fuzzing by Scheduled Mutation and Generation of Document Object Models
title_full_unstemmed Browser Fuzzing by Scheduled Mutation and Generation of Document Object Models
title_sort browser fuzzing by scheduled mutation and generation of document object models
publishDate 2015
url http://ndltd.ncl.edu.tw/handle/34522736060995439796
work_keys_str_mv AT liaofengze browserfuzzingbyscheduledmutationandgenerationofdocumentobjectmodels
AT liàofēngzé browserfuzzingbyscheduledmutationandgenerationofdocumentobjectmodels
AT liaofengze jíyóupáichéngwénjiànwùjiànmóxíngzīliàozhībiànyìyǔshēngchéngjìnxíngliúlǎnqìmóhúcèshì
AT liàofēngzé jíyóupáichéngwénjiànwùjiànmóxíngzīliàozhībiànyìyǔshēngchéngjìnxíngliúlǎnqìmóhúcèshì
_version_ 1718333104412688384