SNOOZE: toward a Stateful NetwOrk prOtocol fuzZEr
G Banks, M Cova, V Felmetsger, K Almeroth… - Information Security: 9th …, 2006 - Springer
Information Security: 9th International Conference, ISC 2006, Samos Island …, 2006•Springer
Fuzzing is a well-known black-box approach to the security testing of applications. Fuzzing
has many advantages in terms of simplicity and effectiveness over more complex, expensive
testing approaches. Unfortunately, current fuzzing tools suffer from a number of limitations,
and, in particular, they provide little support for the fuzzing of stateful protocols. In this paper,
we present SNOOZE, a tool for building flexible, security-oriented, network protocol fuzzers.
SNOOZE implements a stateful fuzzing approach that can be used to effectively identify …
has many advantages in terms of simplicity and effectiveness over more complex, expensive
testing approaches. Unfortunately, current fuzzing tools suffer from a number of limitations,
and, in particular, they provide little support for the fuzzing of stateful protocols. In this paper,
we present SNOOZE, a tool for building flexible, security-oriented, network protocol fuzzers.
SNOOZE implements a stateful fuzzing approach that can be used to effectively identify …
Abstract
Fuzzing is a well-known black-box approach to the security testing of applications. Fuzzing has many advantages in terms of simplicity and effectiveness over more complex, expensive testing approaches. Unfortunately, current fuzzing tools suffer from a number of limitations, and, in particular, they provide little support for the fuzzing of stateful protocols.
In this paper, we present SNOOZE, a tool for building flexible, security-oriented, network protocol fuzzers. SNOOZE implements a stateful fuzzing approach that can be used to effectively identify security flaws in network protocol implementations. SNOOZE allows a tester to describe the stateful operation of a protocol and the messages that need to be generated in each state. In addition, SNOOZE provides attack-specific fuzzing primitives that allow a tester to focus on specific vulnerability classes. We used an initial prototype of the SNOOZE tool to test programs that implement the SIP protocol, with promising results. SNOOZE supported the creation of sophisticated fuzzing scenarios that were able to expose real-world bugs in the programs analyzed.
Springer