NDSS 2025 -DUMPLING: Fine-Grained Differential JavaScript Engine Fuzzing
嗯,用户让我用中文总结一篇文章,控制在100字以内,而且不需要特定的开头。好的,我得先看看这篇文章讲的是什么。 文章标题是“JavaScript Security”,作者来自EPFL和KIT。内容主要介绍了一个叫做DUMPLING的工具,用于检测JavaScript引擎中的漏洞。传统的模糊测试只能检测到崩溃或断言失败的情况,而DUMPLING则通过比较优化和未优化的执行状态来发现差异,这种方法更精准,而且在V8引擎中发现了8个新漏洞,还获得了Google的漏洞奖励。 所以,我需要把重点放在DUMPLING的作用、它如何工作以及取得的成果上。同时要保持简洁,控制在100字以内。 可能的结构是:介绍DUMPLING是一个工具,用于检测JS引擎漏洞,通过比较执行状态发现差异,并成功找到多个漏洞和获得奖励。 再检查一下有没有遗漏的重要信息,比如DUMPLING是如何工作的(仪器化JS引擎),以及它比传统方法更有效。 现在试着组织语言:DUMPLING是一种用于检测JavaScript引擎漏洞的工具,通过比较优化和未优化代码的执行状态来发现差异。这种方法在V8引擎中发现了8个新漏洞,并获得了Google的奖励。 这样应该符合要求了。 </think> DUMPLING是一种用于检测JavaScript引擎漏洞的工具,通过比较优化和未优化代码的执行状态来发现差异,成功在V8引擎中发现8个新漏洞并获得Google奖励。 2026-2-21 16:0:0 Author: securityboulevard.com(查看原文) 阅读量:3 收藏

Session 13A: JavaScript Security

Authors, Creators & Presenters: Liam Wachter (EPFL), Julian Gremminger (EPFL), Christian Wressnegger (Karlsruhe Institute of Technology (KIT)), Mathias Payer (EPFL), Flavio Toffalini (EPFL)
PAPER
DUMPLING: Fine-Grained Differential JavaScript Engine Fuzzing
Web browsers are ubiquitous and execute untrusted JavaScript (JS) code. JS engines optimize frequently executed code through just-in-time (JIT) compilation. Subtly conflicting assumptions between optimizations frequently result in JS engine vulnerabilities. Attackers can take advantage of such diverging assumptions and use the flexibility of JS to craft exploits that produce a miscalculation, remove bounds checks in JIT compiled code, and ultimately gain arbitrary code execution. Classical fuzzing approaches for JS engines only detect bugs if the engine crashes or a runtime assertion fails. Differential fuzzing can compare interpreted code against optimized JIT compiled code to detect differences in execution. Recent approaches probe the execution states of JS programs through ad-hoc JS functions that read the value of variables at runtime. However, these approaches have limited capabilities to detect diverging executions and inhibit optimizations during JIT compilation, thus leaving JS engines under-tested. We propose DUMPLING, a differential fuzzer that compares the full state of optimized and unoptimized execution for arbitrary JS programs. Instead of instrumenting the JS input, DUMPLING instruments the JS engine itself, enabling deep and precise introspection. These extracted fine-grained execution states, coined as (frame) dumps, are extracted at a high frequency even in the middle of JIT compiled functions. DUMPLING finds eight new bugs in the thoroughly tested V8 engine, where previous differential fuzzing approaches struggled to discover new bugs. We receive $11,000 from Google’s Vulnerability Rewards Program for reporting the vulnerabilities found by DUMPLING.
ABOUT NDSS
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.

Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the Organizations’ YouTube Channel.

Permalink

*** This is a Security Bloggers Network syndicated blog from Infosecurity.US authored by Marc Handelman. Read the original post at: https://www.youtube-nocookie.com/embed/SXrjuJxi32I?si=Sg8HPhc2a2Bzl-Ub


文章来源: https://securityboulevard.com/2026/02/ndss-2025-dumpling-fine-grained-differential-javascript-engine-fuzzing/
如有侵权请联系:admin#unsafe.sh