Browse > Article
http://dx.doi.org/10.13089/JKIISC.2014.24.3.535

Event and Command based Fuzzing Method for Verification of Web Browser Vulnerabilities  

Park, Seongbin (Chonnam National University System Security Research Center)
Kim, Minsoo (Mokpo National University)
Noh, Bong-Nam (Chonnam National University System Security Research Center)
Abstract
As the software industry has developed, the attacks making use of software vulnerability has become a big issue in society. In particular, because the attacks using the vulnerability of web browsers bypass Windows protection mechanism, web browsers can readily be attacked. To protect web browsers against security threat, research on fuzzing has constantly been conducted. However, most existing web browser fuzzing tools use a simple fuzzing technique which randomly mutates DOM tree. Therefore, this paper analyzed existing web browser fuzzing tools and the patterns of their already-known vulnerability to propose an event and command based fuzzing tool which can detect the latest web browser vulnerability more effectively. Three kinds of existing fuzzing tools were compared with the proposed tool. As a result, it was found that the event and command based fuzzing tool proposed was more effective.
Keywords
Fuzzing; Event; Command; Vulnerability; Web browser;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Danielle Anne Veluz, "Zero-day Exploit Hits All Versions of Internet Explorer", Trend Micro, Last visited 2014-02-15.
2 Wikipedia, "Document Object Model", http://en.wikipedia.org/wiki/Document_Object_Model, Apr. 2013.
3 Wikipedia, "Heap spraying", http://en.wikipedia.org/wiki/Heap_spraying, Jan. 2014.
4 CVEDetails, "Microsoft Internet Explorer : List of security vulnerabilities", http://www.cvedetails.com/vulnerability-list/vendor_id-26/product_id-9900/Microsoft-Internet-Explorer.html, Jun. 2014.
5 StatCounter, "StatCounter Global Stats- Top 7 Desktop OSs in South Korea from Jan 2012 to May 2014", http://gs.statcounter.com/#desktop-os-KR-monthly-201201-201405, Jun. 2014.
6 Minho Kim, Seongbin Park, Jino Yoon, Minsoo Kim, and Bong-Nam Noh, "File Analysis Data Auto-Creation Model For Peach Fuzzing", Journal of the KITS. vol. 24, no. 2, pp. 327-333, Apr. 2014.   과학기술학회마을   DOI
7 IBM, "IBM X-Force 2012 Trend and Risk Report", http://www.ibm.com/ibm/files/I218646H25649F77/Risk_Report.pdf, IBM Security Systems, Mar. 2013.
8 FireEye, "FireEye, 2014 Forecast Report of Security Threat", FireEye Korea, http://www.fireeye.com/kr/ko/news-events/press-releases/read/fireeye-2014-secyrity-threat-forecase-report, Nov. 2013.
9 Godefroid, Patrice, Adam Kiezun, and Michael Y. Levin. "Grammar-based whitebox fuzzing." ACM SIGPLAN Notices. Vol. 43. No. 6. ACM, 2008.
10 Holler, Christian. "Grammar-based interpreter fuzz testing." Master's Thesis Dissertation, Department of Computer Science, Saarland University, Jun. 2011.
11 W3C, "DOM Event Architecture", http://www.w3.org/TR/DOM-Level-3-Events/#dom-event-architecture, Nov. 2013.
12 Grinder, https://github.com/stephenfewer/grindjer.
13 Tao Guo, Puhan Zhang, Xin Wang, and Qiang Wei, "GramFuzz: Fuzzing Testing of Web Browsers Based on Grammar Analysis and Structural Mutation", ICIA 2013 Second International Conference, pp. 212-215, IEEE, Sep. 2013.
14 Exploit-DB, "MS13-080 Microsoft Internet Explorer CDisplayPointer Use-After-Free", http://www.exploit-db.com/exploits/28974/, Oct. 2013.
15 Exploit-DB, "Micorosft Internet Explorer SetMouseCapture Use-After-Free", http://www.exploit-db.com/exploits/28682/,Oct.2013.
16 Bugzilla, "Bug 332602 - crashes found by hamachi fuzzer at metasploit", https://bugzilla.mozilla.org/show_bug.cgi?id=332602, [Attachment] https://bug332602.bugzilla.mozilla.org/attachment.cgi?id=217061, Apr. 2006.
17 Lcamtuf, "Announcing ref_fuzz, a 2 year old fuzzer", Lcamtuf's blog, http://lcamtuf. blogspot.kr/2010/06/announcing-reffuzz-2yo-fuzzer.html, Jun. 2010.
18 Rosario Valotta, "Taking Browsers Fuzzing To The Next (DOM) Level", DeepSec 2012.