RUS  ENG
Full version
JOURNALS // Proceedings of the Institute for System Programming of the RAS // Archive

Proceedings of ISP RAS, 2021 Volume 33, Issue 4, Pages 211–226 (Mi tisp623)

This article is cited in 1 paper

Features of fuzzing network interfaces without source codes

I. V. Sharkova, V. A. Padaryanba, P. V. Khenkinc

a Ivannikov Institute for System Programming of the Russian Academy of Sciences
b Lomonosov Moscow State University
c PJSC Sberbank

Abstract: The digital transformation of society is leading to the creation of a large number of distributed automated information systems in various areas of modern life. The need to meet security and reliability requirements prompts the creation of tools for their automated testing. Fuzzing within the security development lifecycle (SDL) is a strictly required tool for solving this problem. Tools for fuzzing binary-only applications are in demand too. These kind of fuzzing tools provide the search for critical defects in already functioning systems. It is especially acute when researching the security of proprietary systems operating using closed protocols. In the course of the research, it was found out that for fuzzing network applications in the absence of source codes, the use of universal fuzzers is complicated by many factors. These circumstances are pushing for the creation of an easy-to-use tool for network applications fuzzing. The paper discusses the features of fuzzing of this kind of programs and suggests possible solutions to the identified tasks.

Keywords: fuzzing, testing, network applications, protocol specification, DynamoRIO, protocol state machine.

DOI: 10.15514/ISPRAS-2021-33(4)-15



© Steklov Math. Inst. of RAS, 2024