skip to main content
research-article
Open access

SAGE: Whitebox Fuzzing for Security Testing: SAGE has had a remarkable impact at Microsoft.

Published: 11 January 2012 Publication History

Abstract

Most ACM Queue readers might think of "program verification research" as mostly theoretical with little impact on the world at large. Think again. If you are reading these lines on a PC running some form of Windows (like 93-plus percent of PC users--that is, more than a billion people), then you have been affected by this line of work--without knowing it, which is precisely the way we want it to be.

References

[1]
Bhansali, S., Chen, W., De Jong, S., Edwards, A., Drinic, M. 2006. Framework for instruction-leveltracing and analysis of programs. In Second International Conference on Virtual ExecutionEnvironments.
[2]
de Moura, L., Bjorner, N. 2008. Z3: an efficient SMT solver. In Proceedings of TACAS (Tools andAlgorithms for the Construction and Analysis of Systems), volume 4963 of Lecture Notes in ComputerScience: 337-340. Springer-Verlag.
[3]
Forrester, J. E., Miller, B. P. 2000. An empirical study of the robustness of Windows NT applicationsusing random testing. In Proceedings of the 4th Usenix Windows System Symposium, Seattle (August).
[4]
Godefroid, P., Klarlund, N., Sen, K. 2005. DART: Directed Automated Random Testing. InProceedings of PLDI (Programming Language Design and Implementation): 213-223.
[5]
Godefroid, P., Levin, M. Y., Molnar, D. 2008. Automated whitebox fuzz testing. In Proceedings ofNDSS (Network and Distributed Systems Security): 151-166.
[6]
Howard, M. 2007. Lessons learned from the animated cursor security bug; http://blogs.msdn.com/sdl/archive/2007/04/26/lessons-learned-fromthe-animated-cursor-security-bug.aspx.
[7]
Howard, M., Lipner, S. 2006. The Security Development Lifecycle. Microsoft Press.
[8]
Narayanasamy, S.,Wang, Z., Tigani, J., Edwards, A., Calder, B. 2007. Automatically classifyingbenign and harmful data races using replay analysis. In Programming Languages Design andImplementation (PLDI).
[9]
Sotirov, A. 2007. Windows animated cursor stack overflow vulnerability; http://www.determina.com/security.research/vulnerabilities/ani-header.html.

Cited By

View all
  • (2024)Impact of Blockchain on Improving Taxpayers’ Compliance: Empirical Evidence from Panel Data Model and Agent-Based SimulationJournal of Emerging Technologies in Accounting10.2308/JETA-2022-04621:1(89-109)Online publication date: 14-Mar-2024
  • (2024)FuSeBMC v4: Improving Code Coverage with Smart Seeds via BMC, Fuzzing and Static AnalysisFormal Aspects of Computing10.1145/366533736:2(1-25)Online publication date: 20-May-2024
  • (2024)Accurate Architectural Threat Elicitation From Source Code Through Hybrid Information Flow AnalysisProceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings10.1145/3639478.3639795(139-141)Online publication date: 14-Apr-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Queue
Queue  Volume 10, Issue 1
Networks
January 2012
24 pages
ISSN:1542-7730
EISSN:1542-7749
DOI:10.1145/2090147
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 January 2012
Published in QUEUE Volume 10, Issue 1

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Popular
  • Editor picked

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4,960
  • Downloads (Last 6 weeks)463
Reflects downloads up to 23 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Impact of Blockchain on Improving Taxpayers’ Compliance: Empirical Evidence from Panel Data Model and Agent-Based SimulationJournal of Emerging Technologies in Accounting10.2308/JETA-2022-04621:1(89-109)Online publication date: 14-Mar-2024
  • (2024)FuSeBMC v4: Improving Code Coverage with Smart Seeds via BMC, Fuzzing and Static AnalysisFormal Aspects of Computing10.1145/366533736:2(1-25)Online publication date: 20-May-2024
  • (2024)Accurate Architectural Threat Elicitation From Source Code Through Hybrid Information Flow AnalysisProceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings10.1145/3639478.3639795(139-141)Online publication date: 14-Apr-2024
  • (2024)Reorder Pointer Flow in Sound Concurrency Bug PredictionProceedings of the IEEE/ACM 46th International Conference on Software Engineering10.1145/3597503.3623300(1-13)Online publication date: 20-May-2024
  • (2024)Machine Learning-Based Fuzz Testing Techniques: A SurveyIEEE Access10.1109/ACCESS.2023.334765212(14437-14454)Online publication date: 2024
  • (2024)Exploring Loose Coupling of Slicing with Dynamic Symbolic Execution on the JVMTests and Proofs10.1007/978-3-031-72044-4_9(168-175)Online publication date: 9-Sep-2024
  • (2024)Netfuzzlib: Adding First-Class Fuzzing Support to Network Protocol ImplementationsComputer Security – ESORICS 202410.1007/978-3-031-70890-9_4(65-84)Online publication date: 16-Sep-2024
  • (2023)FISHFUZZProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620313(1343-1360)Online publication date: 9-Aug-2023
  • (2023)Сучасні наукові проблеми кібербезпекиVisnik Nacional noi academii nauk Ukrai ni10.15407/visn2023.02.012(12-20)Online publication date: 20-Feb-2023
  • (2023)Demystify the Fuzzing Methods: A Comprehensive SurveyACM Computing Surveys10.1145/362337556:3(1-38)Online publication date: 5-Oct-2023
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Magazine Site

View this article on the magazine site (external)

Magazine Site

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media