Bi Yechuan, Peng Jianshan, Lin Zhiqiang. WINDOWS DRIVER VULNERABILITY MINING METHOD BASED ON SYSTEM CALL INTERFACE[J]. Computer Applications and Software, 2025, 42(1): 359-366. DOI: 10.3969/j.issn.1000-386x.2025.01.050
Citation: Bi Yechuan, Peng Jianshan, Lin Zhiqiang. WINDOWS DRIVER VULNERABILITY MINING METHOD BASED ON SYSTEM CALL INTERFACE[J]. Computer Applications and Software, 2025, 42(1): 359-366. DOI: 10.3969/j.issn.1000-386x.2025.01.050

WINDOWS DRIVER VULNERABILITY MINING METHOD BASED ON SYSTEM CALL INTERFACE

  • The fuzzing test for Windows kernel and driver has the problem of invalid seed mutation and low efficiency. On the basis of the fuzzing test based on the system call interface, Intel processor trace was used to provide code coverage for driver vulnerability mining, and by maintaining the interface parameter data structure for targeted data mutation, kifuzzer, the driver fuzzing test framework was realized. Experiments show that kifuzzer is much more efficient than other driver mining methods for ioctl (input/output control).
  • loading

Catalog

    Turn off MathJax
    Article Contents

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return