Skip to content

Commit

Permalink
Update Meeting “sp2025/seminar/2025-02-02/index”
Browse files Browse the repository at this point in the history
  • Loading branch information
WhiteHoodHacker committed Feb 2, 2025
1 parent c19bc64 commit e04ba72
Show file tree
Hide file tree
Showing 2 changed files with 11 additions and 5 deletions.
Binary file not shown.
16 changes: 11 additions & 5 deletions _global/content/meetings/sp2025/seminar/2025-02-02/index.mdx
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
title: Seminar Meeting
title: "FUZZWARE: Fuzzing Firmware"
type: seminar
time_start: 2025-02-02T14:00:00-06:00
duration: ""
Expand All @@ -8,9 +8,15 @@ credit:
featured: true
location: DCL 1310
description: Join us for our first seminar meeting of the semester!
live_video_url: https://illinois.zoom.us/j/83241330740?pwd=MeabLMdM4diR29xxwpciODjsZWczbZ.1
slides: fuzzware-seminar-.pdf
---
## Abstract
Coming soon!

## Summary
Join us for our first seminar meeting of the semester!
We will be covering the paper, [Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing](https://www.usenix.org/conference/usenixsecurity22/presentation/scharnowski) by Scharnowski et al., presented at USENIX 31.

## Paper Abstract
As embedded devices are becoming more pervasive in our everyday lives, they turn into an attractive target for adversaries. Despite their high value and large attack surface, applying automated testing techniques such as fuzzing is not straightforward for such devices. As fuzz testing firmware on constrained embedded devices is inefficient, state-of-the-art approaches instead opt to run the firmware in an emulator (through a process called re-hosting). However, existing approaches either use coarse-grained static models of hardware behavior or require manual effort to re-host the firmware.

We propose a novel combination of lightweight program analysis, re-hosting, and fuzz testing to tackle these challenges. We present the design and implementation of FUZZWARE, a software-only system to fuzz test unmodified monolithic firmware in a scalable way. By determining how hardware generated values are actually used by the firmware logic, FUZZWARE can automatically generate models that help focusing the fuzzing process on mutating the inputs that matter, which drastically improves its effectiveness.

We evaluate our approach on synthetic and real-world targets comprising a total of 19 hardware platforms and 77 firmware images. Compared to state-of-the-art work, FUZZWARE achieves up to 3.25 times the code coverage and our modeling approach reduces the size of the input space by up to 95.5%. The synthetic samples contain 66 unit tests for various hardware interactions, and we find that our approach is the first generic re-hosting solution to automatically pass all of them. FUZZWARE discovered 15 completely new bugs including bugs in targets which were previously analyzed by other works; a total of 12 CVEs were assigned.

0 comments on commit e04ba72

Please sign in to comment.