File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Full metadata record

DC Field Value Language
dc.contributor.advisor Moon, Hyungon -
dc.contributor.author Jang, Wonil -
dc.date.accessioned 2026-03-26T22:13:47Z -
dc.date.available 2026-03-26T22:13:47Z -
dc.date.issued 2026-02 -
dc.description.abstract Use-after-free (UAF) is one of the most critical memory bugs and can be exploited to compromise software systems. Although many mitigation and discovery techniques have been proposed, discovering UAF vulnerabilities through fuzzing remains challenging because a UAF arises only when allocation, deallocation, and dereference operations occur in a specific temporal ordering on the same heap object. To address this challenge, recent fuzzing approaches guide input generation using feedback derived from heap operation sequences. HTFuzz, for example, promotes temporal diversity in heap behaviors by diversifying heap operation sequences observed at runtime. However, this feedback is not optimized for UAF discovery, as it does not distinguish heap operations by their target objects or explicitly capture pointer propagation required to expose UAF vulnerabilities. In this paper, we propose hsAFL, a heap-object state-transition-guided fuzzing approach that targets these limitations. hsAFL tracks object-level UAF-related state transitions, including pointer-copy operations, and prioritizes inputs that exercise new operation edges under object-specific state transitions. We evaluate hsAFL through repeated fuzzing experiments on seven real-world programs, with ten four-hour runs per target. Because hsAFL maintains state information for individual heap objects, it incurs additional runtime overhead and can reduce execution throughput. Despite this overhead, the results show that hsAFL discovers UAF vulnerabilities earlier than HTFuzz in four out of seven programs. -
dc.description.degree Master -
dc.description Department of Computer Science and Engineering -
dc.identifier.uri https://scholarworks.unist.ac.kr/handle/201301/90942 -
dc.identifier.uri http://unist.dcollection.net/common/orgView/200000965470 -
dc.language ENG -
dc.publisher Ulsan National Institute of Science and Technology -
dc.rights.embargoReleaseDate 9999-12-31 -
dc.rights.embargoReleaseTerms 9999-12-31 -
dc.subject Composite Manufacturing -
dc.title Heap-Object State-Transition-Guided Fuzzing for Use-After-Free Vulnerabilities -
dc.type Thesis -

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.