ProFuzzBench is a benchmark for stateful fuzzing of network protocols. It includes a suite of representative open-source network servers for popular protocols (e.g., TLS, SSH, SMTP, FTP, SIP), and tools to automate experimentation.
We have published a technical report for ProFuzzBench.
@misc{profuzzbench,
title={ProFuzzBench: A Benchmark for Stateful Protocol Fuzzing},
author={Roberto Natella and Van-Thuan Pham},
year={2021},
eprint={2101.05102},
archivePrefix={arXiv},
primaryClass={cs.CR}
}
protocol-fuzzing-benchmark
├── subjects: this folder contains all protocols included in this benchmark and
│ │ each protocol may have more than one target server
│ └── RTSP
│ └── FTP
│ │ └── LightFTP
│ │ └── Dockerfile: subject-specific Dockerfile
│ │ └── run.sh: (subject-specific) main script to run experiment inside a container
│ │ └── cov_script.sh: (subject-specific) script to do code coverage analysis
│ │ └── other files (e.g., patches, other subject-specific scripts)
│ └── ...
└── scripts: this folder contains all scripts to run experiments, collect & analyze results
│ └── execution
│ │ └── profuzzbench_exec_common.sh: main script to spawn containers and run experiments on them
│ │ └── ...
│ └── analysis
│ └── profuzzbench_generate_csv.sh: this script collect code coverage results from different runs
│ └── profuzzbench_plot.py: sample script for plotting
└── README.md
Tutorial - Fuzzing LightFTP server with AFLNet and AFLNet_Legion, a network-enabled version of AFL
Follow the steps below to run and collect experimental results for LightFTP, which is a lightweight File Transfer Protocol (FTP) server. The similar steps should be followed to run experiments on other subjects. Each subject program comes with a README.md file showing subject-specific commands to run experiments.
git clone https://github.com/profuzzbench/profuzzbench.git
cd profuzzbench
export PFBENCH=$(pwd)
export PATH=$PATH:$PFBENCH/scripts:$PFBENCH/scripts/execution:$PFBENCH/scripts/analysis
The following commands create a docker image tagged lightftp. The image should have everything available for fuzzing and code coverage collection.
This fork of ProFuzzBench requires access to AFLNet_Legion, which needs the following <github.{username, password}>
to pull from that GitRepo.
cd $PFBENCH
cd subjects/FTP/LightFTP
docker build --no-cache --rm --build-arg USR=<github.username> --build-arg PSW=<github.password> -t donggeliu/lightftp .
Run run_all
to run fuzzing, collect the results, and plot the results. The script takes 8 arguments as listed below.
ONLY_LEGION
: Wether to run:- Both AFLNet and AFLNet_Legion (value
0
), or - Only run AFLNet_Legion (value
1
) and reuse theresult.csv
of AFLNet from the directory specified in the second parameter.
- Both AFLNet and AFLNet_Legion (value
PRE_RESULTS
: The directory that stores theresult.csv
ofAFLNet
. If the first parameter is0
, then this does not matter.TIME_MINUTE
: Experiment duration in minutes.LOG_LVL
: Verbosity ofAFLNet_Legion
logging. Level 0-5 correspond to"TRACE"
,"DEBUG"
,"INFO"
,"WARN”
,"ERROR"
,"FATAL”
. Logs will be stored aslog_aflnet_legion_*.ansi
.IGN_AST
: Ignore assertion failures (value1
) or exit with error when assertion fails (value0
).FUZZ_M3
: FuzzM3
(value1
) or not (value0
).RHO
: The value of the exploration coefficient in MCTS.SUBJECT
: The benchmarking subject.
For example, the following command runs both AFLNet
and AFLNet_Legon
for 10 minutes, keeps all logs, ignores assertion failures, does not fuzz M3
, and uses 1.414
as the exploration coefficient in AFLNet_Legion
.
run_all 0 x 10 0 1 0 1.414 lightftp
The script will create a directory named <SUBJECT>_<TIME_MINUTE>MIN_<ONLY,BOTH>_AT<TIME_STAMP>
, in which:
- <
SUBJECT>
is the benchmarking subject; <TIME_MINUTE>
is the experiment duration;<ONLY,BOTH>
will beONLY
inAFLNet_Legion
only mode, and vice versa;<TIME_STAMP>
will be the time when the script is run.
Or, run the commands one by one:
Run profuzzbench_exec_common.sh script to start an experiment. The script takes 8 arguments as listed below.
- 1st argument (DOCIMAGE) : name of the docker image
- 2nd argument (RUNS) : number of runs, one isolated Docker container is spawned for each run
- 3rd argument (SAVETO) : path to a folder keeping the results
- 4th argument (FUZZER) : fuzzer name (e.g., aflnet) -- this name must match the name of the fuzzer folder inside the Docker container (e.g., /home/ubuntu/aflnet)
- 5th argument (OUTDIR) : name of the output folder created inside the docker container
- 6th argument (OPTIONS) : all options needed for fuzzing in addition to the standard options written in the target-specific run.sh script
- 7th argument (TIMEOUT) : time for fuzzing in seconds
- 8th argument (SKIPCOUNT): used for calculating coverage over time. e.g., SKIPCOUNT=5 means we run gcovr after every 5 test cases because gcovr takes time and we do not want to run it after every single test case
The following commands run 4 instances of AFLNet and 4 instances of AFLnwe to simultaenously fuzz LightFTP in 60 minutes.
cd $PFBENCH
mkdir results-lightftp
profuzzbench_exec_common.sh lightftp 4 results-lightftp aflnet out-lightftp-aflnet "-P FTP -D 10000 -q 3 -s 3 -E -K -c ./ftpclean.sh" 3600 5 &
profuzzbench_exec_common.sh lightftp 4 results-lightftp aflnwe out-lightftp-aflnwe "-D 10000 -K -c ./ftpclean.sh" 3600 5
If the script runs successfully, its output should look similar to the text below.
AFLNET: Fuzzing in progress ...
AFLNET: Waiting for the following containers to stop: f2da4b72b002 b7421386b288 cebbbc741f93 5c54104ddb86
AFLNET: Collecting results and save them to results-lightftp
AFLNET: Collecting results from container f2da4b72b002
AFLNET: Collecting results from container b7421386b288
AFLNET: Collecting results from container cebbbc741f93
AFLNET: Collecting results from container 5c54104ddb86
AFLNET: I am done!
All results (in tar files) should be stored in the folder created in Step-2 (results-lightftp). Specifically, these tar files are the compressed version of output folders produced by all fuzzing instances. If the fuzzer is afl based (e.g., AFLNet, AFLnwe) each folder should contain sub-folders like crashes, hangs, queue and so on. Use profuzzbench_generate_csv.sh script to collect results in terms of code coverage over time. The script takes 5 arguments as listed below.
- 1st argument (PROG) : name of the subject program (e.g., lightftp)
- 2nd argument (RUNS) : number of runs
- 3rd argument (FUZZER) : fuzzer name (e.g., aflnet)
- 4th argument (COVFILE): CSV-formatted output file keeping the results
- 5th argument (APPEND) : append mode; set this to 0 for the first fuzzer and 1 for the subsequent fuzzer(s).
The following commands collect the code coverage results produced by AFLNet and AFLnwe and save them to results.csv.
cd $PFBENCH/results-lightftp
profuzzbench_generate_csv.sh lightftp 4 aflnet results.csv 0
profuzzbench_generate_csv.sh lightftp 4 aflnwe results.csv 1
The results.csv file should look similar to text below. The file has six columns showing the timestamp, subject program, fuzzer name, run index, coverage type and its value. The file contains both line coverage and branch coverage over time information. Each coverage type comes with two values, in percentage (_per) and in absolute number (_abs).
time,subject,fuzzer,run,cov_type,cov
1600905795,lightftp,aflnwe,1,l_per,25.9
1600905795,lightftp,aflnwe,1,l_abs,292
1600905795,lightftp,aflnwe,1,b_per,13.3
1600905795,lightftp,aflnwe,1,b_abs,108
1600905795,lightftp,aflnwe,1,l_per,25.9
1600905795,lightftp,aflnwe,1,l_abs,292
The results collected in step 3 (i.e., results.csv) can be used for plotting. For instance, we provide a sample Python script to plot code coverage over time. Use the following command to plot the results and save it to a file.
cd $PFBENCH/results-lightftp
profuzzbench_plot.py -i results.csv -p lightftp -r 4 -c 60 -s 1 -o cov_over_time.png
This is a sample code coverage report generated by the script.
If you want to add a new protocol and/or a new target server (of a supported protocol), please follow the above folder structure and complete the steps below. We use LightFTP as an example.
The folder for LightFTP server is subjects/FTP/LightFTP.
Step-2. Write a Docker file for the new target server and prepare all the subject-specific scripts/files (e.g., target-specific patch, seed corpus)
The following folder structure shows all files we have prepared for fuzzing LightFTP server. Please read our paper to understand the purposes of these files.
subjects/FTP/LightFTP
├── Dockerfile (required): based on this, a target-specific Docker image is built (See Step-1 in the tutorial)
├── run.sh (required): main script to run experiment inside a container
├── cov_script.sh (required): script to do code coverage analysis
├── clean.sh (optional): script to clean server states before fuzzing to improve the stability
├── fuzzing.patch (optional): code changes needed to improve fuzzing results (e.g., remove randomness)
├── gcov.patch (required): code changes needed to support code coverage analysis (e.g., enable gcov, add a signal handler)
├── ftp.dict (optional): a dictionary containing protocol-specific tokens/keywords to support fuzzing
└── in-ftp (required): a seed corpus capturing sequences of client requests sent to the server under test.
│ │ To prepare these seeds, please follow the AFLNet tutorial at https://github.com/aflnet/aflnet.
│ │ Please use ".raw" extension for all seed inputs.
│ │
│ └── ftp_requests_full_anonymous.raw
│ └── ftp_requests_full_normal.raw
└── README.md (optional): a target-specific README containing commands to run experiments
All the required files (i.e., Dockerfile, run.sh, cov_script.sh, gcov.patch, and the seed corpus) follow some templates so that one can easily follow them to prepare files for a new target.
Once a Docker image is successfully built, you should test your commands, as written in a target-specific README.md, inside a single Docker container. For example, we run the following commands to check if everything is working for LightFTP.
//start a container
docker run -it lightftp /bin/bash
//inside the docker container
//run a 60-min fuzzing experiment using AFLNet
cd experiments
run aflnet out-lightftp-aflnet "-P FTP -D 10000 -q 3 -s 3 -E -K -c ./ftpclean.sh" 3600 5
If everything works, there should be no error messages and all the results are stored inside the out-lightftp-aflnet folder.
Each experiment has two parts: fuzzing and code coverage analysis. The fuzzing part should complete after the specified timeout; however, the code coverage analysis time is subject-specific and it could take several hours if the generated corpus is large or the target server is slow. You can log into the running containers to check the progress if you think your experiment hangs.