PTfuzz: Guided Fuzzing With Processor Trace Feedback

Abstract
Greybox fuzzing, such as AFL, is very efficient in finding software vulnerability, which makes it the state-of-the-art fuzzing technology. Greybox fuzzing leverages the branch information collected during program running as feedback to guide choosing seeds. Current greybox fuzzing generally uses two kinds of methods to collect branch information: compile-time instrumentation (AFL) and emulation (QAFL). Compile-time instrumentation is efficient, but it does not support binary programs. Meanwhile emulation supports binary programs, but its efficiency is very low. In this paper, we propose a greybox fuzzing approach named PTfuzz, which leverages hardware mechanism (Intel Processor Trace) to collect branch information. Our approach supports binary programs, just like the emulation method, while it gains a comparable performance with the compile-time instrumentation method. Our experiments show that PTfuzz can fuzz the original binary programs without any modification, and we gain a 3X performance improvement compared to QAFL.
Funding Information
  • National Key Research and Development Program of China (2016YFB0200401)
  • Program for New Century Excellent Talents in University
  • National High-level Personnel for Defense Technology Program (2017-JCJQ-ZQ-013)
  • Hunan Province Science foundation (2017RS3045)

This publication has 17 references indexed in Scilit: