This paper introduces a dynamic feedback-based vulnerability mining method tailored for highly closed terminal protocols, addressing the limitations of traditional fuzz testing methods which struggle with closed-source protocols due to the lack of accessible code or protocol specifications. The proposed method overcomes these barriers by generating test cases using Large Language Models (LLMs) and optimizing them through real-time execution feedback without a deep understanding of the protocol. The primary contributions include a balanced training set construction method for LLMs, integration of LLMs with fuzz testing to generate test cases without relying on protocol knowledge, and a real-time feedback mechanism from a state machine to LLMs for continuous test case optimization. The method’s effectiveness is validated through experiments on a closed-source protocol, MQTT, and SSH, demonstrating significant improvements over conventional AFL fuzz testing. The results show that the proposed method can identify up to 4.34 times more valid cases in closed-source protocols, highlighting its efficiency in vulnerability detection.
|