Skip to main content

SulleyEX: A Fuzzer for Stateful Network Protocol

  • Conference paper
  • First Online:
Network and System Security (NSS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10394))

Included in the following conference series:

Abstract

Fuzzing has become one of the most important technologies in the field of network security, and fuzzer also has become an important tool for discovering network vulnerabilities. But for the stateful network protocol fuzzing, most of fuzzers could not effectively cover the state trajectory, and not achieve a good automation. Aiming at the above issues, this paper designs a fuzzer named SulleyEX based on the open source project Sulley. Firstly, the SulleyEX uses finite-state machine to describe the state trajectory of stateful network protocol and further generates sessions automatically. That dramatically enhances the automation of Sulley session management module. In order to improve the optional ability of the fuzzer, the SulleyEX could automatically extract the protocol format based on Sulley’s data presentation module as well as provide an interface to custom fuzz testing data generation algorithm. Comparing with the traditional Sulley, the experimental results highlight that the SulleyEX could successfully discover the same vulnerability, while the SulleyEX achieves higher automation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Stutton, M., Greene, A., Amini, P.: Fuzzing: brute force vulnerability discovery. Addison Wesley Professional, Boston (2007)

    Google Scholar 

  2. Fuzz. http://pages.cs.wisc.edu/~bart/fuzz

  3. SPIKE. http://www.immunitysec.com/resources-free-software

  4. Banks, G., Cova, M., Felmetsger, V., Almeroth, K., Kemmerer, R., Vigna, G.: SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr. In: Katsikas, Sokratis K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol. 4176, pp. 343–358. Springer, Heidelberg (2006). doi:10.1007/11836810_25

    Chapter  Google Scholar 

  5. Abdelnur, H.J., Festor, O.: KIF: a stateful SIP fuzzer. In: 1st International Conference on Principles, Systems and Applications of IP Telecommunications, pp. 47–56. ACM Press, New York (2007). doi:10.1145/1326304.1326313

  6. Alrahem, T., Chen, A., Digiussepe, N.: INTERSTATE: a stateful protocol fuzzer for SIP. Defcon 15, 1–5 (2007)

    Google Scholar 

  7. Kitagawa, T., Hanaoka, M.: AspFuzz: a state-aware protocol fuzzer based on application-layer protocol. In: IEEE Symposium on Computers and Communications, pp. 202–208. IEEE Press, New York (2010). doi:10.1109/ISCC.2010.5546704

  8. Akbar, M.A., Faroop, M.: RTP-miner: a real-time security framework for RTP fuzzing attacks. In: 20th International Workshop on Network and Operating Systems Support for Digital Audio and Video, pp. 87–92. ACM Press, New York (2010). doi:10.1145/1806565.1806587

  9. Li, M.W., Zhang, A.F., Liu, J.C.: Automated vulnerability mining for network protocol fuzz testing. Chin. J. Comput. 34(2), 242–255 (2011). doi:10.3724/SP.J.1016.2011.00242. (in Chinese)

    Article  Google Scholar 

  10. Tsankov, P., Dashti, M.T., Basin, D.: SecFuzz: fuzz-testing security protocols. In: 7th International Workshop on Automation of Software Test, pp. 1–7. IEEE Press, New York, (2012). doi:10.1109/IWAST.2012.6228985

  11. Sulley. https://github.com/OpenRCE/sulley

  12. Ma, R., Ji, W.D., Hu, C.Z., Shan, C., Peng, W.: Fuzz testing data generation for network protocol using classification tree. In: 2014 Communication Security Conference, pp. 97–101. IET Press, London (2014). doi:10.1049/cp.2014.0748

  13. CVE. http://cve.scap.org.cn/CVE-2013-2278.html

  14. Security-upgrade of War FTP Daemon 1.82 [CVE-2013-2278]. http://www.warftp.org/in-dex.php?cmd=show_article&article_id=1035

Download references

Acknowledgment

This work was supported by National Key R&D Program of China (No. 2016YFB0800700).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rui Ma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Ma, R., Zhu, T., Hu, C., Shan, C., Zhao, X. (2017). SulleyEX: A Fuzzer for Stateful Network Protocol. In: Yan, Z., Molva, R., Mazurczyk, W., Kantola, R. (eds) Network and System Security. NSS 2017. Lecture Notes in Computer Science(), vol 10394. Springer, Cham. https://doi.org/10.1007/978-3-319-64701-2_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-64701-2_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-64700-5

  • Online ISBN: 978-3-319-64701-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics