Reducing time-to-fix for fuzzer bugs

Rui Abreu,Franjo Ivancic,Filip Niksic, Hadi Ravanbakhsh, Ramesh Viswanathan

Automated Software Engineering(2021)

引用 1|浏览11
暂无评分
摘要
BSTRACTAt Google, fuzzing C/C++ libraries has discovered tens of thousands of security and robustness bugs. However, these bugs are often reported much after they were introduced. Developers are provided only with fault-inducing test inputs and replication instructions that highlight a crash, but additional debugging information may be needed to localize the cause of the bug. Hence, developers need to spend substantial time debugging the code and identifying commits that introduced the bug. In this paper, we discuss our experience with automating a fuzzing-enabled bisection that pinpoints the commit in which the crash first manifests itself. This ultimately reduces the time critical bugs stay open in our code base. We report on our experience over the past year, which shows that developers fix bugs on average 2.23 times faster when aided by this automated analysis.
更多
查看译文
关键词
fuzz testing,bisection,testing,fuzzing,software security
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要