Evocatio

Zhiyuan Jiang,Shuitao Gan,Adrian Herrera,Flavio Toffalini,Lucio Romerio,Chaojing Tang,Manuel Egele,Chao Zhang,Mathias Payer
DOI: https://doi.org/10.1145/3548606.3560575
2022-01-01
Abstract:The popularity of coverage-guided greybox fuzzers has led to a tsunami of security-critical bugs that developers must prioritize and fix. Knowing the capabilities a bug exposes (e.g., type of vulnerability, number of bytes read/written) enables prioritization of bug fixes. Unfortunately, understanding a bug's capabilities is a time consuming process, requiring (a) an understanding of the bug's root cause, (b) an understanding how an attacker may exploit the bug, and (c) the development of a patch mitigating these threats. This is a mostly-manual process that is qualitative and arbitrary, potentially leading to a misunderstanding of the bug's capabilities.
What problem does this paper attempt to address?