Fuzzing error handling code using context-sensitive software fault injection [conference paper]
Conference
29th USENIX Security Symposium - August 12-14, 2020
Authors
Zu-Ming Jiang, Jia-Ju Bai, Kangjie Lu (assistant professor), Shi-Min Hu
Abstract
Error handling code is often critical but difficult to test in reality. As a result, many hard-to-find bugs exist in error handling code and may cause serious security problems once triggered. Fuzzing has become a widely used technique for finding software bugs nowadays. Fuzzing approaches mutate and/or generate various inputs to cover infrequently-executed code. However, existing fuzzing approaches are very limited in testing error handling code, because some of this code can be only triggered by occasional errors (such as insufficient memory and network-connection failures), but not specific inputs. Therefore, existing fuzzing approaches in general cannot effectively test such error handling code.
Link to full paper
Fuzzing error handling code using context-sensitive software fault injection
Keywords
security