MUZZ: Thread-aware grey-box fuzzing for effective bug hunting in multithreaded programs

  • Hongxu Chen
  • , Shengjian Guo
  • , Yinxing Xue
  • , Yulei Sui
  • , Cen Zhang
  • , Yuekang Li
  • , Haijun Wang
  • , Yang Liu

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

101 Scopus citations

Abstract

Grey-box fuzz testing has revealed thousands of vulnerabilities in real-world software owing to its lightweight instrumentation, fast coverage feedback, and dynamic adjusting strategies. However, directly applying grey-box fuzzing to input-dependent multithreaded programs can be extremely inefficient. In practice, multithreading-relevant bugs are usually buried in the sophisticated program flows. Meanwhile, existing grey-box fuzzing techniques do not stress thread-interleavings that affect execution states in multithreaded programs. Therefore, mainstream grey-box fuzzers cannot adequately test problematic segments in multithreaded software, although they might obtain high code coverage statistics. To this end, we propose MUZZ, a new grey-box fuzzing technique that hunts for bugs in multithreaded programs. MUZZ owns three novel thread-aware instrumentations, namely coverage-oriented instrumentation, thread-context instrumentation, and schedule-intervention instrumentation. During fuzzing, these instrumentations engender runtime feedback to accentuate execution states caused by thread interleavings. By leveraging such feedback in the dynamic seed selection and execution strategies, MUZZ preserves more valuable seeds that expose bugs under a multithreading context. We evaluate MUZZ on twelve real-world multithreaded programs. Experiments show that MUZZ outperforms AFL in both multithreading-relevant seed generation and concurrency-vulnerability detection. Further, by replaying the target programs against the generated seeds, MUZZ also reveals more concurrency-bugs (e.g., data-races, thread-leaks) than AFL. In total, MUZZ detected eight new concurrency-vulnerabilities and nineteen new concurrency-bugs. At the time of writing, four reported issues have received CVE IDs.

Original languageEnglish
Title of host publicationProceedings of the 29th USENIX Security Symposium
PublisherUSENIX Association
Pages2325-2342
Number of pages18
ISBN (Electronic)9781939133175
StatePublished - 2020
Externally publishedYes
Event29th USENIX Security Symposium, USENIX Security 2020 - Virtual, Online
Duration: 12 Aug 202014 Aug 2020

Publication series

NameProceedings of the 29th USENIX Security Symposium

Conference

Conference29th USENIX Security Symposium, USENIX Security 2020
CityVirtual, Online
Period12/08/2014/08/20

Fingerprint

Dive into the research topics of 'MUZZ: Thread-aware grey-box fuzzing for effective bug hunting in multithreaded programs'. Together they form a unique fingerprint.

Cite this