Demystifying OS Kernel Fuzzing with a Novel Taxonomy
- URL: http://arxiv.org/abs/2501.16165v1
- Date: Mon, 27 Jan 2025 16:03:14 GMT
- Title: Demystifying OS Kernel Fuzzing with a Novel Taxonomy
- Authors: Jiacheng Xu, He Sun, Shihao Jiang, Qinying Wang, Mingming Zhang, Xiang Li, Kaiwen Shen, Peng Cheng, Jiming Chen, Charles Zhang, Shouling Ji,
- Abstract summary: We present the first systematic study dedicated to OS kernel fuzzing.
It begins by summarizing the progress of 99 academic studies from top-tier venues between 2017 and 2024.
We introduce a stage-based fuzzing model and a novel fuzzing taxonomy that highlights nine core functionalities unique to kernel fuzzing.
- Score: 42.56259589772939
- License:
- Abstract: The Operating System (OS) kernel is foundational in modern computing, especially with the proliferation of diverse computing devices. However, its development also comes with vulnerabilities that can lead to severe security breaches. Kernel fuzzing, a technique used to uncover these vulnerabilities, poses distinct challenges when compared to userspace fuzzing. These include the complexity of configuring the testing environment and addressing the statefulness inherent to both the kernel and the fuzzing process. Despite the significant interest from the security community, a comprehensive understanding of kernel fuzzing remains lacking, hindering further progress in the field. In this paper, we present the first systematic study dedicated to OS kernel fuzzing. It begins by summarizing the progress of 99 academic studies from top-tier venues between 2017 and 2024. Following this, we introduce a stage-based fuzzing model and a novel fuzzing taxonomy that highlights nine core functionalities unique to kernel fuzzing. These functionalities are examined alongside their corresponding methodological approaches based on qualitative evaluation criteria. Our systematization identifies challenges in meeting functionality requirements and proposes potential technical solutions. Finally, we outline promising and practical future directions to guide forthcoming research in kernel security, supported in part by insights derived from our case study.
Related papers
- A Survey of Fuzzing Open-Source Operating Systems [11.770015366564774]
Vulnerabilities in open-source operating systems pose substantial security risks.
fuzzing (OSF) faces unique challenges due to OS complexity and multi-layered interaction.
This work systematically surveys the state-of-the-art OSF techniques.
arXiv Detail & Related papers (2025-02-17T02:53:02Z) - FuzzEval: Assessing Fuzzers on Generating Context-Sensitive Inputs [0.0]
This paper presents a comprehensive evaluation of fuzzers' ability to generate context-sensitive inputs for testing a cryptographic standard.
Our study reveals nuanced performance differences among the fuzzers in terms of the validity and diversity of the produced inputs.
arXiv Detail & Related papers (2024-09-18T21:55:53Z) - A Survey of Unikernel Security: Insights and Trends from a Quantitative Analysis [0.0]
This research presents a quantitative methodology using TF-IDF to analyze the focus of security discussions within unikernel research literature.
Memory Protection Extensions and Data Execution Prevention were the least frequently occurring topics, while SGX was the most frequent topic.
arXiv Detail & Related papers (2024-06-04T00:51:12Z) - Securing Monolithic Kernels using Compartmentalization [0.9236074230806581]
A single flaw in a non-essential part of the kernel can cause the entire operating system to fall under an attacker's control.
Kernel hardening techniques might prevent certain types of vulnerabilities, but they fail to address a fundamental weakness.
We propose a taxonomy that allows the community to compare and discuss future work.
arXiv Detail & Related papers (2024-04-12T04:55:13Z) - Navigating the Concurrency Landscape: A Survey of Race Condition Vulnerability Detectors [0.12289361708127873]
This paper focuses on the realm of race condition bug detectors.
We systematically categorize these detectors based on the diverse methodologies they employ.
We shed light on the application of fuzzing techniques in the detection of race condition vulnerabilities.
arXiv Detail & Related papers (2023-12-22T07:05:39Z) - A Discrepancy Aware Framework for Robust Anomaly Detection [51.710249807397695]
We present a Discrepancy Aware Framework (DAF), which demonstrates robust performance consistently with simple and cheap strategies.
Our method leverages an appearance-agnostic cue to guide the decoder in identifying defects, thereby alleviating its reliance on synthetic appearance.
Under the simple synthesis strategies, it outperforms existing methods by a large margin. Furthermore, it also achieves the state-of-the-art localization performance.
arXiv Detail & Related papers (2023-10-11T15:21:40Z) - Beyond the Prior Forgery Knowledge: Mining Critical Clues for General
Face Forgery Detection [61.74632676703288]
We propose a novel Critical Forgery Mining framework, which can be flexibly assembled with various backbones to boost generalization and performance.
Specifically, we first build a fine-grained triplet and suppress specific forgery traces through prior knowledge-agnostic data augmentation.
We then propose a fine-grained relation learning prototype to mine critical information in forgeries through instance and local similarity-aware losses.
arXiv Detail & Related papers (2023-04-24T23:02:27Z) - Evolution of Neural Tangent Kernels under Benign and Adversarial
Training [109.07737733329019]
We study the evolution of the empirical Neural Tangent Kernel (NTK) under standard and adversarial training.
We find under adversarial training, the empirical NTK rapidly converges to a different kernel (and feature map) than standard training.
This new kernel provides adversarial robustness, even when non-robust training is performed on top of it.
arXiv Detail & Related papers (2022-10-21T15:21:15Z) - Meta-Learning Hypothesis Spaces for Sequential Decision-making [79.73213540203389]
We propose to meta-learn a kernel from offline data (Meta-KeL)
Under mild conditions, we guarantee that our estimated RKHS yields valid confidence sets.
We also empirically evaluate the effectiveness of our approach on a Bayesian optimization task.
arXiv Detail & Related papers (2022-02-01T17:46:51Z) - Dos and Don'ts of Machine Learning in Computer Security [74.1816306998445]
Despite great potential, machine learning in security is prone to subtle pitfalls that undermine its performance.
We identify common pitfalls in the design, implementation, and evaluation of learning-based security systems.
We propose actionable recommendations to support researchers in avoiding or mitigating the pitfalls where possible.
arXiv Detail & Related papers (2020-10-19T13:09:31Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.