Towards Correct and Efficient Persistent Fuzzing: Dynamic Coverage Removal and State Management

dc.contributor.authorEarp, Sydney Kathrynen
dc.contributor.committeechairHicks, Matthewen
dc.contributor.committeememberYao, Danfengen
dc.contributor.committeememberChung, Taejoong Tijayen
dc.contributor.departmentComputer Science and#38; Applicationsen
dc.date.accessioned2025-06-21T08:00:28Zen
dc.date.available2025-06-21T08:00:28Zen
dc.date.issued2025-06-12en
dc.description.abstractCoverage-guided fuzzing is a powerful technique for automatically discovering software bugs and security vulnerabilities. This work improves the efficiency and correctness of coverage-guided fuzzers by introducing dynamic removal of redundant coverage instrumentation and implementing a state-managed version of persistent mode. Traditional coverage instrumentation remains active even after code regions have been thoroughly explored, resulting in unnecessary runtime overhead. Meanwhile, persistent fuzzing—used to accelerate input execution by looping the target program in memory—can suffer from state contamination between test cases. To address these challenges, this system dynamically disables coverage tracking for already-covered paths and uses compiler-inserted instrumentation to restore global variables, heap allocations, and file state at the start of each iteration. The result is a fast, self-contained fuzzing framework that improves execution throughput and test isolation, without requiring OS-level support or recompilation.en
dc.description.abstractgeneralModern software systems are complex, and finding bugs or vulnerabilities in them is difficult and time-consuming. One popular method to automate this process is called fuzzing, where a program is repeatedly tested using random or unexpected inputs to see if it crashes or behaves incorrectly. This research focuses on a particular kind of fuzzing that uses feedback to explore new parts of the program. However, this approach can be inefficient—it often checks the same parts of the program repeatedly and may reuse parts of memory that still contain leftovers from previous tests, which can cause inaccurate results. This work improves the speed and reliability of fuzzing by removing unnecessary checks and ensuring that the program starts fresh for every test. These improvements make fuzzing faster and more trustworthy for finding bugs in real software.en
dc.description.degreeMaster of Scienceen
dc.format.mediumETDen
dc.identifier.othervt_gsexam:44126en
dc.identifier.urihttps://hdl.handle.net/10919/135550en
dc.language.isoenen
dc.publisherVirginia Techen
dc.rightsIn Copyrighten
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/en
dc.subjectFuzzingen
dc.subjectSoftware Securityen
dc.subjectProgram Instrumentationen
dc.titleTowards Correct and Efficient Persistent Fuzzing: Dynamic Coverage Removal and State Managementen
dc.typeThesisen
thesis.degree.disciplineComputer Science & Applicationsen
thesis.degree.grantorVirginia Polytechnic Institute and State Universityen
thesis.degree.levelmastersen
thesis.degree.nameMaster of Scienceen

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Earp_SK_T_2025.pdf
Size:
4.49 MB
Format:
Adobe Portable Document Format

Collections