Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Conferences, Workshops, Symposiums, and Seminars
  4. GLeeFuzz: FuzzingWebGL Through Error Message Guided Mutation
 
conference paper

GLeeFuzz: FuzzingWebGL Through Error Message Guided Mutation

Peng, Hui
•
Yao, Zhihao
•
Sani, Ardalan Amiri
Show more
January 1, 2023
Proceedings Of The 32Nd Usenix Security Symposium
32nd USENIX Security Symposium

WebGL is a set of standardized JavaScript APIs for GPU accelerated graphics. Security of the WebGL interface is paramount because it exposes remote and unsandboxed access to the underlying graphics stack (including the native GL libraries and GPU drivers) in the host OS. Unfortunately, applying state-of-the-art fuzzing techniques to the WebGL interface for vulnerability discovery is challenging because of (1) its huge input state space, and (2) the infeasibility of collecting code coverage across concurrent processes, closed-source libraries, and device drivers in the kernel.|Our fuzzing technique, GLeeFuzz, guides input mutation by error messages instead of code coverage. Our key observation is that browsers emit meaningful error messages to aid developers in debugging their WebGL programs. Error messages indicate which part of the input fails (e.g., incomplete arguments, invalid arguments, or unsatisfied dependencies between API calls). Leveraging error messages as feedback, the fuzzer effectively expands coverage by focusing mutation on erroneous parts of the input. We analyze Chrome's WebGL implementation to identify the dependencies between error-emitting statements and rejected parts of the input, and use this information to guide input mutation. We evaluate our GLeeFuzz prototype on Chrome, Firefox, and Safari on diverse desktop and mobile OSes. We discovered 7 vulnerabilities, 4 in Chrome, 2 in Safari, and 1 in Firefox. The Chrome vulnerabilities allow a remote attacker to freeze the GPU and possibly execute remote code at the browser privilege.

  • Details
  • Metrics
Type
conference paper
Web of Science ID

WOS:001066451502001

Author(s)
Peng, Hui
Yao, Zhihao
Sani, Ardalan Amiri
Tian, Dave (Jing)
Payer, Mathias  
Corporate authors
USENIX Association
Date Issued

2023-01-01

Publisher

Usenix Assoc

Publisher place

Berkeley

Published in
Proceedings Of The 32Nd Usenix Security Symposium
ISBN of the book

978-1-939133-37-3

Start page

1883

End page

1899

Subjects

Technology

Editorial or Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
HEXHIVE  
Event nameEvent placeEvent date
32nd USENIX Security Symposium

Anaheim, CA

AUG 09-11, 2023

FunderGrant Number

European Research Council (ERC) under the European Union

850868

DARPA

HR001119S0089-AMP-FP-034

NSF

CNS-1846230

Show more
Available on Infoscience
February 20, 2024
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/204627
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés