SRFuzzer

Yu Zhang,Wei Huo,Kunpeng Jian,Jingxue Shi,Haoliang Lu,Longquan Liu,Chen Wang,Dandan Sun,Chao Zhang,Baoxu Liu
DOI: https://doi.org/10.1145/3359789.3359826
2019-01-01
Abstract:SOHO (small office/home office) routers provide services for end devices to connect to the Internet, playing an important role in the cyberspace. Unfortunately, security vulnerabilities pervasively exist in these routers, especially in the web server modules, greatly endangering end users. To discover these vulnerabilities, fuzzing web server modules of SOHO routers is the most popular solution. However, its effectiveness is limited, due to the lack of input specification, lack of routers' internal running states, and lack of testing environment recovery mechanisms. Moreover, fuzzing in general only reports memory corruption vulnerabilities, and fails to discover other vulnerabilities, e.g., web-based vulnerabilities.
What problem does this paper attempt to address?