Netinfo Security ›› 2025, Vol. 25 ›› Issue (3): 403-414.doi: 10.3969/j.issn.1671-1122.2025.03.004

Previous Articles     Next Articles

Research on LLM-Based Fuzzing of Native Multimedia Libraries

XIE Mengfei1,2, FU Jianming1,2(), YAO Renyi1,2   

  1. 1. School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China
    2. Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education, Wuhan 430072, China
  • Received:2024-10-16 Online:2025-03-10 Published:2025-03-26
  • Contact: FU Jianming E-mail:jmfu@whu.edu.cn

Abstract:

Multimedia native libraries written in C/C++ can efficiently process audio and video streams by directly accessing underlying system resources, while posing persistent memory threats. However, existing native library fuzzing research lacks specificity for multimedia libraries and faces difficulties in implementing runtime monitoring of closed-source binary programs. The article proposed MediaFuzzer, a fuzzing scheme of native multimedia libraries based on LLM. Through a self-heuristic LLM querying approach, MediaFuzzer could accurately extracted functional semantic information contained in function signatures and subsequently identified potential multimedia native library functions as execution entry points. Furthermore, MediaFuzzer designed and implemented an emulation-based fuzzing framework that built comprehensive runtime monitoring mechanisms at three different levels, including system dependencies, memory management, and code execution, enabling coverage-guided mutation and active memory anomaly detection during the fuzzing process. Experimental evaluation shows that MediaFuzzer identify 1557 multimedia functions across 7 categories from 500 mobile applications, successfully discovering one disclosed vulnerability in WhatsApp and three zero-day vulnerabilities, including one in WeChat.

Key words: native multimedia libraries, fuzzing, memory safety, large language model

CLC Number: