TY - GEN
T1 - AspFuzz
T2 - 15th IEEE Symposium on Computers and Communications, ISCC 2010
AU - Kitagawa, Takahisa
AU - Hanaoka, Miyuki
AU - Kono, Kenji
PY - 2010/9/17
Y1 - 2010/9/17
N2 - In the face of constant malicious attacks to network-connected software systems, software vulnerabilities need to be discovered early in the development phase. In this paper, we present AspFuzz, a state-aware protocol fuzzer based on the specifications of application-layer protocols. AspFuzz automatically generates anomalous messages that exploit possible vulnerabilities. The key observation behind AspFuzz is that most of the previously reported attack messages violate the strict specifications of application-layer protocols. For example, they do not conform to the rigid format or syntax required of each message. In addition, some attack messages ignore the protocol states and have incorrect orders of messages. AspFuzz automatically generates a large number of anomalous messages that deliberately violate the specifications of application-layer protocols. It then sends the generated messages in both anomalous orders and correct orders. To demonstrate the effectiveness of AspFuzz, we conducted experiments with POP3 and HTTP servers. With AspFuzz, we can discover 20 reported and 1 previously unknown vulnerabilities for POP3 servers and 25 reported vulnerabilities for HTTP servers.
AB - In the face of constant malicious attacks to network-connected software systems, software vulnerabilities need to be discovered early in the development phase. In this paper, we present AspFuzz, a state-aware protocol fuzzer based on the specifications of application-layer protocols. AspFuzz automatically generates anomalous messages that exploit possible vulnerabilities. The key observation behind AspFuzz is that most of the previously reported attack messages violate the strict specifications of application-layer protocols. For example, they do not conform to the rigid format or syntax required of each message. In addition, some attack messages ignore the protocol states and have incorrect orders of messages. AspFuzz automatically generates a large number of anomalous messages that deliberately violate the specifications of application-layer protocols. It then sends the generated messages in both anomalous orders and correct orders. To demonstrate the effectiveness of AspFuzz, we conducted experiments with POP3 and HTTP servers. With AspFuzz, we can discover 20 reported and 1 previously unknown vulnerabilities for POP3 servers and 25 reported vulnerabilities for HTTP servers.
KW - Fuzzing
KW - Software vulnerability testing
UR - http://www.scopus.com/inward/record.url?scp=77956540790&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77956540790&partnerID=8YFLogxK
U2 - 10.1109/ISCC.2010.5546704
DO - 10.1109/ISCC.2010.5546704
M3 - Conference contribution
AN - SCOPUS:77956540790
SN - 9781424477555
T3 - Proceedings - IEEE Symposium on Computers and Communications
SP - 202
EP - 208
BT - IEEE Symposium on Computers and Communications, ISCC 2010
Y2 - 22 June 2010 through 25 June 2010
ER -