CONFU: Configuration Fuzzing Testing Framework for Software Vulnerability Detection

Huning Dai; Christian Murphy; Gail E. Kaiser

CONFU: Configuration Fuzzing Testing Framework for Software Vulnerability Detection
Dai, Huning
Murphy, Christian
Kaiser, Gail E.
Technical reports
Computer Science
Permanent URL:
Columbia University Computer Science Technical Reports
Part Number:
Department of Computer Science, Columbia University
Publisher Location:
New York
Many software security vulnerabilities only reveal themselves under certain conditions, i.e., particular configurations and inputs together with a certain runtime environment. One approach to detecting these vulnerabilities is fuzz testing. However, typical fuzz testing makes no guarantees regarding the syntactic and semantic validity of the input, or of how much of the input space will be explored. To address these problems, we present a new testing methodology called Configuration Fuzzing. Configuration Fuzzing is a technique whereby the configuration of the running application is mutated at certain execution points, in order to check for vulnerabilities that only arise in certain conditions. As the application runs in the deployment environment, this testing technique continuously fuzzes the configuration and checks "security invariants'' that, if violated, indicate a vulnerability. We discuss the approach and introduce a prototype framework called ConFu (CONfiguration FUzzing testing framework) for implementation. We also present the results of case studies that demonstrate the approach's feasibility and evaluate its performance.
Computer science
Item views:
text | xml
Suggested Citation:
Huning Dai, Christian Murphy, Gail E. Kaiser, 2010, CONFU: Configuration Fuzzing Testing Framework for Software Vulnerability Detection, Columbia University Academic Commons, http://hdl.handle.net/10022/AC:P:10507.

In Partnership with the Center for Digital Research and Scholarship at Columbia University Libraries | Terms of Use | Copyright