crytic / medusa

Parallelized, coverage-guided, mutational Solidity smart contract fuzzing, powered by go-ethereum
https://secure-contracts.com/program-analysis/medusa/docs/src/
GNU Affero General Public License v3.0
301 stars 40 forks source link

Experiment with libfuzzer coverage-based feedback loop #53

Open ggrieco-tob opened 1 year ago

ggrieco-tob commented 1 year ago

Echidna coverage based feedback loop is not great, for a number of reason. The most important: it is too simple and it is unclear it is good enough to react quickly when there is a new coverage in the corpus. I suggest to test, even using some naive approach, the libfuzzer port to golang to see if it works better.

Xenomega commented 1 year ago

It sounds interesting to explore the opportunities to leverage libFuzzer somewhere here. Just for more context, what do we mean by react quickly? Our actual fuzzing strategy in how we use values in the new corpus sequence to feed into the fuzzer, or etc?

Also what are we thinking in terms of priority here? I figure some other tasks we have as medium priority should maybe come first, so maybe a low, very-low if it's more of an experimental idea? Or would you prefer we take this more seriously and explore this when doing #28 in parallel?

ggrieco-tob commented 1 year ago

libfuzzer will start re-using some input as soon as it triggers more coverage, while echidna will put it in a queue to mutate it in a indeterminate amount of time in the future. libfuzzer also perform frecuents minimization of the input to re-use smaller inputs, which could be useful in this case (assuming we define some reasonable minimization function in medusa)

Xenomega commented 1 year ago

ah, gotcha. and for sure!

0xalpharush commented 1 month ago

Entropic scheduler

edge = hash(pc, jumpdest)

For a given edge count hits.

global (edge -> hit count) sort low to high

For a given input track edge covered.

(input -> set(edge))

Scheduler:

queue by rarity sort by sum(idx) where idx = position of edge in hit count