This survey examines the key differences between traditional fuzzing and protocol fuzzing, highlighting the unique challenges posed by the high communication complexity and constrained testing environments of protocols.
In the input generator component, the survey discusses two main approaches for constructing the communication model - top-down methods that leverage protocol specifications, and bottom-up methods that infer the model from observed network traffic or program analysis. It also covers the scheduling techniques used to handle the state-related complexities, categorizing them into hierarchical and monolithic approaches.
For the executor component, the survey explores techniques for efficient execution and runtime information extraction to support the input generation and bug detection processes.
Finally, the bug collector component is examined, with a taxonomy of techniques for detecting memory safety bugs and non-memory safety bugs specific to protocol implementations.
The survey concludes by discussing potential future research directions in the field of protocol fuzzing.
Til et annet språk
fra kildeinnhold
arxiv.org
Viktige innsikter hentet fra
by Xiaohan Zhan... klokken arxiv.org 09-20-2024
https://arxiv.org/pdf/2401.01568.pdfDypere Spørsmål