Netinfo Security ›› 2024, Vol. 24 ›› Issue (2): 282-292.doi: 10.3969/j.issn.1671-1122.2024.02.011

Previous Articles     Next Articles

Multidimensional Depth Oriented Fuzzing Method of Java Web Applications

WANG Juan1,2, GONG Jiaxin1,2, LIN Ziqing3(), ZHANG Xiaojuan3   

  1. 1. School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China
    2. Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education, Wuhan University, Wuhan 430072, China
    3. Institute of Information and Communication, China Electric Power Research lnstitute Co., Ltd., Beijing 100192, China
  • Received:2023-04-12 Online:2024-02-10 Published:2024-03-06
  • Contact: LIN Ziqing E-mail:linziqing@epri.sgcc.com.cn

Abstract:

With the popularity of Java language, the security issue of these applications is becoming more and more serious. As an effective vulnerability mining method, fuzzing has been used to detect Java application vulnerabilities. However, due to the huge code scale and complex business logic of Java Web application, existing vulnerability mining tools suffer from high randomness in testing and low depth of code detection, resulting in low accuracy of vulnerability mining. To solve these problems, this paper designed and implemented a multidimensional depth oriented fuzzing method of Java Web applications. This method generated the three address codes of the application bytecode to be tested, and then obtained the corresponding inter function call graph and intra function control flow graph. According to this information, an algorithm was designed to obtain the multidimensional depth of each basic block. Then, according to the multidimensional depth and fuzzing execution time, the fuzzing guidance strategy of the system was designed, and the corresponding input structure analysis strategy, energy allocation strategy and mutation algorithm scheduling strategy were designed to improve the efficiency of fuzzing. Compared with the existing widely used fuzzing tool Peach and Kelinci, it shows that this method can achieve better vulnerability mining effect under the condition of low performance consumption.

Key words: fuzzing, Java Web, vulnerability mining

CLC Number: