search
HomeTechnology peripheralsAIOne step closer to 'fully automatic' vulnerability mining! Tencent Security Big Data Laboratory paper selected for ACM CCS 2023

ACM CCS 2023, the international authoritative academic conference in the field of computer science, opened on November 26 in Copenhagen, Denmark. The paper "Hopper: Interpretative Fuzzing for Libraries" by the Tencent Security Big Data Laboratory team was included in the conference. Yesterday, laboratory researcher Xie Yuxuan was invited to attend the conference to share the theme.

距离“全自动”漏洞挖掘又近了一步!腾讯安全大数据实验室论文入选ACM CCS 2023

This research proposes an interpretive fuzz testing method, showing how to use dynamic feedback to learn constraints inside and outside the API to achieve automated code generation. Through this method, without any external expert knowledge, it is possible to generate valid and usable code calling methods and exploit these codes to exploit vulnerabilities. The goal of this research method is to solve the problem that fuzz testing requires manual construction of entrances, thereby greatly improving the efficiency and application scope of automated vulnerability mining

In the past few years, fuzzing technology (Fuzzing) has proven to be an A very effective vulnerability mining method. The main principle of this technology is to test the processing capabilities of software by generating a large number of random inputs, thereby helping developers automatically discover defects in software. At present, fuzz testing technology has been widely used in open source software and commercial software. However, fuzz testing relies on developers to manually build test entrances (fuzz drivers) to test target objects. Writing test entries with correct logic and high coverage requires developers to have a deep understanding of the library under test and requires a lot of work. Due to the high threshold, there are still many codes (including projects, APIs, etc.) that have not been covered by fuzz testing, resulting in a limitation in the degree of "automation" of vulnerability mining.

Tencent Security Big Data Laboratory proposed a A new testing method called interpretive fuzz testing. This testing method does not require developers to write test entrances, enables Fuzzer to directly generate programs to be executed, and enables fully automated learning and testing of any library API. It completely opens up the fully automated process of fuzz testing and greatly improves the efficiency of automated vulnerability mining

Based on this method, Tencent Security Big Data Laboratory implemented the automated vulnerability mining tool Hopper, and used it in 11 open source libraries The effect of Hopper is evaluated in the paper. The results show that Hopper has a significant advantage in coverage performance in three of the libraries, and can achieve results comparable to manually constructed entrances in other libraries.

距离“全自动”漏洞挖掘又近了一步!腾讯安全大数据实验室论文入选ACM CCS 2023Hopper has shown an extremely high level of API coverage, reaching 93.52%. In comparison, manually written fuzz test entries can only cover about 15%-30% of the API

距离“全自动”漏洞挖掘又近了一步!腾讯安全大数据实验室论文入选ACM CCS 2023In addition, the intra-API constraints inferred by Hopper can reach 96.51% The accuracy rate greatly improves the success rate and efficiency of generating code

距离“全自动”漏洞挖掘又近了一步!腾讯安全大数据实验室论文入选ACM CCS 2023Finally, in the experiment, Hopper directly used the dynamic feedback of execution to generate code that can test the API. While greatly improving API test coverage, it also successfully identified a series of real software defects and submitted them to relevant platforms and developers for repair.

The researchers published the above research results in the form of a paper, which was included in ACM CCS 2023. ACM CCS, together with IEEE S&P, USENIX Security, and NDSS, is known as the four top conferences in the field of computer security. It has a history of nearly 30 years and has had a significant and far-reaching impact on the field of computer security. The conference enjoys a high reputation in the field of computer security and is also recognized as a Class A international academic conference on network and information security by the China Computer Federation (CCF).

Tencent Security Big Data Laboratory believes that the internal and external technologies facing network security are constantly developing, but the essence of network security is vulnerabilities and attack and defense. Therefore, how to find system vulnerabilities before attackers is not Changing theme. In the era of large models, Tencent Security will also continue to explore how to empower new technologies such as AI in vulnerability mining and improve efficiency.

The above is the detailed content of One step closer to 'fully automatic' vulnerability mining! Tencent Security Big Data Laboratory paper selected for ACM CCS 2023. For more information, please follow other related articles on the PHP Chinese website!

Statement
This article is reproduced at:机器之心. If there is any infringement, please contact admin@php.cn delete
Most Used 10 Power BI Charts - Analytics VidhyaMost Used 10 Power BI Charts - Analytics VidhyaApr 16, 2025 pm 12:05 PM

Harnessing the Power of Data Visualization with Microsoft Power BI Charts In today's data-driven world, effectively communicating complex information to non-technical audiences is crucial. Data visualization bridges this gap, transforming raw data i

Expert Systems in AIExpert Systems in AIApr 16, 2025 pm 12:00 PM

Expert Systems: A Deep Dive into AI's Decision-Making Power Imagine having access to expert advice on anything, from medical diagnoses to financial planning. That's the power of expert systems in artificial intelligence. These systems mimic the pro

Three Of The Best Vibe Coders Break Down This AI Revolution In CodeThree Of The Best Vibe Coders Break Down This AI Revolution In CodeApr 16, 2025 am 11:58 AM

First of all, it’s apparent that this is happening quickly. Various companies are talking about the proportions of their code that are currently written by AI, and these are increasing at a rapid clip. There’s a lot of job displacement already around

Runway AI's Gen-4: How Can AI Montage Go Beyond AbsurdityRunway AI's Gen-4: How Can AI Montage Go Beyond AbsurdityApr 16, 2025 am 11:45 AM

The film industry, alongside all creative sectors, from digital marketing to social media, stands at a technological crossroad. As artificial intelligence begins to reshape every aspect of visual storytelling and change the landscape of entertainment

How to Enroll for 5 Days ISRO AI Free Courses? - Analytics VidhyaHow to Enroll for 5 Days ISRO AI Free Courses? - Analytics VidhyaApr 16, 2025 am 11:43 AM

ISRO's Free AI/ML Online Course: A Gateway to Geospatial Technology Innovation The Indian Space Research Organisation (ISRO), through its Indian Institute of Remote Sensing (IIRS), is offering a fantastic opportunity for students and professionals to

Local Search Algorithms in AILocal Search Algorithms in AIApr 16, 2025 am 11:40 AM

Local Search Algorithms: A Comprehensive Guide Planning a large-scale event requires efficient workload distribution. When traditional approaches fail, local search algorithms offer a powerful solution. This article explores hill climbing and simul

OpenAI Shifts Focus With GPT-4.1, Prioritizes Coding And Cost EfficiencyOpenAI Shifts Focus With GPT-4.1, Prioritizes Coding And Cost EfficiencyApr 16, 2025 am 11:37 AM

The release includes three distinct models, GPT-4.1, GPT-4.1 mini and GPT-4.1 nano, signaling a move toward task-specific optimizations within the large language model landscape. These models are not immediately replacing user-facing interfaces like

The Prompt: ChatGPT Generates Fake PassportsThe Prompt: ChatGPT Generates Fake PassportsApr 16, 2025 am 11:35 AM

Chip giant Nvidia said on Monday it will start manufacturing AI supercomputers— machines that can process copious amounts of data and run complex algorithms— entirely within the U.S. for the first time. The announcement comes after President Trump si

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
4 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
4 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
1 months agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Chat Commands and How to Use Them
1 months agoBy尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Atom editor mac version download

Atom editor mac version download

The most popular open source editor

MinGW - Minimalist GNU for Windows

MinGW - Minimalist GNU for Windows

This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.

EditPlus Chinese cracked version

EditPlus Chinese cracked version

Small size, syntax highlighting, does not support code prompt function

Dreamweaver Mac version

Dreamweaver Mac version

Visual web development tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor