• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    FastAFLGo:Toward a Directed Greybox Fuzzing

    2021-12-15 07:10:06ChunlaiDuTongJinYanhuiGuoBinghaoJiaandBinLi
    Computers Materials&Continua 2021年12期

    Chunlai Du,Tong Jin,Yanhui Guo,Binghao Jia and Bin Li

    1School of Information Science and Technology,North China University of Technology,Beijing,100144,China

    2Department of Computer Science,University of Illinois Springfield,Springfield,62703,IL,USA

    3Civil Aviation Management Institute of China,Beijing,100102,China

    Abstract:While the size and complexity of software are rapidly increasing,not only is the number of vulnerabilities increasing, but their forms are diversifying.Vulnerability has become an important factor in network attack and defense.Therefore, automatic vulnerability discovery has become critical to ensure software security.Fuzzing is one of the most important methods of vulnerability discovery.It is based on the initial input,i.e.,a seed,to generate mutated test cases as new inputs of a tested program in the next execution loop.By monitoring the path coverage, fuzzing can choose high-value test cases for inclusion in the new seed set and capture crashes used for triggering vulnerabilities.Although there have been remarkable achievements in terms of the number of discovered vulnerabilities, the reduction of time cost is still inadequate.This paper proposes a fast directed greybox fuzzing model,FastAFLGo.A fast convergence formula of temperature is designed,and the energy scheduling scheme can quickly determine the best seed to make the program execute toward the target basic blocks.Experimental results show that FastAFLGo can discover more vulnerabilities than the traditional fuzzing method in the same execution time.

    Keywords: Directed; greybox; fuzzing; power schedule

    1 Introduction

    With the proliferation of network applications related to people’s work and lives [1], the threat of network attack is becoming severe; the confrontations between network attack and defense are frequent [2–5].Attackers use vulnerabilities to implement network penetration attacks.According to data from Cvedetails [6], more than 10000 vulnerabilities were exposed each year from 2017 to 2019 (see Fig.1).Not only is the number of vulnerabilities increasing rapidly, but the degree of harm presents an upward trend.With the increase in software logic complexity and the proliferation of code size, automatic vulnerability fuzzing has become a popular research topic.

    Figure 1:Number of vulnerabilities exposed by year

    Using the characteristics of the tested program and input data, with the help of various dynamic and static program analysis technologies, automatic vulnerability fuzzing aims to find the balance between the coverage and efficiency of the analysis of a tested program and to alleviate the problems of low path coverage and poor scalability, improve the efficiency of vulnerability fuzzing, and discover more or deeper vulnerabilities in a shorter time.Software vulnerability fuzzing technologies include binary comparison, model detection, static analysis, taint analysis, fuzzing, and symbol execution.With homology analysis on software code blocks, artificial intelligence technology has been recently introduced to vulnerability fuzzing research.

    Fuzzing is an important automatic vulnerability discovery method, whose core idea is to discover potential vulnerabilities of a program by constructing irregular data as the input and to determine whether a program will crash when processing it.By tracking the processing in which inputs trigger the tested program to crash, the researcher analyzes the cause and develops an exploitation code.Once a crash occurs, the code blocks concerned with the crash can become vulnerabilities.

    The advantage of fuzzing is that it can quickly generate a large number of test cases as input for the tested program to execute, and can automatically capture the crashes.However, the test cases are randomly generated based on some mutated strategies.When test cases must cover a specific path of the program or pass some verification requested by it, a large number of invalid test cases will reduce the efficiency of vulnerability fuzzing.Hence to improve the efficiency of the fuzzing is an important challenge.

    This paper makes the following contributions:

    (1) A directed fuzzing model, FastAFLGo, is proposed based on AFLGo [7], the efficiency of which is enhanced by assigning high energy to seeds closer to the target basic blocks.

    (2) A new cooling schedule is proposed in which the temperature can drop rapidly to enter the exploitation phase under the condition of ensuring sufficient time for the exploration phase.

    (3) Comparisons with several typical fuzzing models on the LAVA-M dataset show that FastAFLGo improves the efficiency of vulnerability fuzzing without increasing time consumption.

    2 Related Work

    Fuzzing methods include whitebox, greybox, and blackbox.Whitebox fuzzing can get the tested program source code and then analyze it.Based on fully understanding the internal logic structure of the tested program, whitebox fuzzing can generate more accurate test cases; correspondingly, due to lack of source code, blackbox fuzzing does not analyze the tested program at all and arbitrarily generates a large number of test cases for the tested program to execute.Tested programs usually include some magic bytes to verify the input; hence, the efficiency of blackbox fuzzing is very low, and this method is almost no longer used in actual vulnerability fuzzing.Greybox fuzzing is a method in between.Since greybox fuzzing cannot get the source code of the tested program, it can only analyze the binary code to obtain information for use as knowledge to generate test cases.The execution states of the tested program are analyzed, and the input test cases are modified accordingly.

    Fuzzing methods can also be divided, according to the strategies of new test case generation,as mutation-based fuzzing, generation-based fuzzing, hybrid fuzzing, and symbolic execution.

    2.1 Mutation-Based Fuzzing

    Mutation-based fuzzing, which is based on the static and dynamic analysis of the tested program and execution information, continually generates test cases mutated from seeds.Representative seed-selection algorithms include AFL [8], Honggfuzz [9], LibFuzzer [10], CollAFL [11],and VUzzer [12].To reduce the generation of invalid test cases is an important goal.AFL aims to improve the path coverage rate.By monitoring the execution of the path, new paths are found or low-frequency paths are executed, and corresponding test cases are included in the seed set.Because the size of the bitmap file used to record the execution times of the path is only 64K bytes, there is a hash collision problem.To solve this problem, CollAFL uses an improved hash approach and increases the size of the bitmap file, which reduces the possibility of collision and improves the statistical effect of path coverage.To explore more paths and reduce the excessive execution of high-frequency paths, AFLFast [13] selects seeds by gravitating toward low-frequency paths in a Markov chain.VUzzer regards the basic blocks within deep paths as the primary targets.Based on the static analysis of the control flow of the tested program, the key constant string is identified and extracted to reduce the number of invalid test cases.At the same time, the weights of these basic blocks are calculated.During fuzzing, the test cases corresponding to the execution path with the highest weight are selected as the seed.

    Unlike the above fuzzing models, which focus on control flow characteristics, GREYONE [14]focuses on data flow characteristics, infers the tainted variables by changing the input bytes, and monitors the changes in variable values during the fuzzing process.The evolution direction of the fuzzing is adjusted according to the distance between the tainted variable and the expected value of the untouched branch.Steelix [15] extracts magic bytes of the tested program through lightweight static analysis and binary instrumentation, and generates test cases through verification of the magic byte.

    AFLGo, Hawkeye [16], and AFLPro [17] adopt the guided fuzzing strategy that approaches the target basic blocks.AFLGo optimizes the seed by using the energy schedule based on a simulated annealing algorithm to assign more energy to test cases closer to the target basic blocks.Hawkeye precisely collects some important information, such as a called graph, the distance between different functions and the target basic blocks.It generates dynamic metrics for the seed’s energy schedule and adaptive mutation.AFLPro proposes a strategy of direction-sensitive fuzzing.It improves the validity of selected seeds based on basic block aggregation (BBA), achieves fine-grained seeds by using a multi-dimensional oriented selection strategy, and optimizes genetic variation to ensure the diversity of the seed.TortoiseFuzz [18] is a fuzzing method for detecting memory corruption vulnerabilities, which employs a coverage-guided fuzzer with coverage accounting for prioritization of test cases.The coverage accounting concerns three metrics consisting of functions, loops, and basic blocks.Current greybox fuzzing does not consider the thread interleavings that affect the execution states in a multi-threaded program.MUZZ [19] uses three thread-aware instrumentations, i.e., coverage-oriented, thread-context, and schedule-intervention.These create feedback in runtime, which can be used in dynamic seed selection.

    2.2 Generation-Based Fuzzing

    Based on format information and grammar knowledge of the tested program, fuzzing can automatically generate highly structured test cases.Peach [20] writes a configuration file to constrain the format of test cases.Langfuzz [21] utilizes code fragments in the grammar learning test set and recombines these to generate a new test case.Because generation-based fuzzing relies heavily on the generated model or grammar training, traditional generation-based fuzzing is less efficient than mutation-based fuzzing.Machine learning has recently been introduced to fuzzing.Machine learning technology is used to analyze and learn massive numbers of test cases to guide the generation of higher-quality test cases.For instance, Learn & Fuzz [22] transforms the problem of high structured test case generation to that of text generation in the natural language processing (NLP) domain.The use of a training dataset and statistical machine learning technology can automatically generate test cases that conform to grammar.NEUZZ [23] uses a surrogate neural network to incrementally learn smooth approximations of the tested program’s branch behaviors and guides the generation of test cases through gradient-guided input-generation schemes.

    2.3 Hybrid Fuzzing and Symbolic Execution

    When fuzzing cannot cover more branches during execution, or when it is difficult to generate test cases that can cover a certain target basic block, fuzzing, and symbolic execution are combined to generate test cases to execute new paths.Symbolic execution, such as S2E [24] and Angr [25], builds branch constraints through symbolization analysis and can generate test cases for each path with the help of a constraint solver.Because symbolic execution consists of rigorous logical reasoning under constraints, the biggest problems are path explosion and difficulty in constraint solving.Driller [26] combines AFL and Angr to explore the execution path of the tested program alternately by fuzzing and symbolic execution.This can determine how to generate a test case that can make the tested program to execute a new testing path of deeper basic blocks when the path coverage of the tested program is growing slowly, and it directly avoids path explosion due to symbolic execution.Similarly, Munch [27] combines symbolic execution and fuzzing to improve deeper path coverage.The difference between Munch and Driller is that Munch uses a guided strategy.

    3 Energy Schedules

    3.1 Motivation

    B?hme [7,13] showed that coverage-based greybox fuzzing can be modeled as a Markov chain.A power schedule decides how many test cases are generated by fuzzing the seed in each state.How to assign the power on each seed becomes a key question.Power schedule strategies yield different priorities of paths to be executed.One of our research goals is to discover the vulnerability of the tested program as much as possible, and another is to discover more vulnerabilities within a limited time.For example, if we request some memory overflow vulnerabilities, we must execute a power schedule strategy on the preferred basic blocks, including a large number of memory operations as soon as possible.If we want to discover vulnerabilities in specific areas, such as in patch code, we can guide the power schedule by assigning more energy to seeds that are closer to the target locations.AFL uses a constant power schedule by which a fairly high amount of energy is assigned to the seeds.AFLFast adopts an exponential power schedule to gravitate the fuzzer toward low-frequency paths in each Markov state.The seeds are assigned very little energy the first time, but when constantly chosen, they will be assigned more energy.AFLGo adopts the simulated annealing-based Markov Chain Monte Carlo (MCMC) power schedule.The closer to the target locations, the more energy assigned to the seed.

    AFLFast evaluates six kinds of power schedules:the exploitation-based constant schedule (EXPLOIT), exploration-based constant schedule (EXPLOIT), cut-off exponential schedule(COE), exponential schedule (FAST), linear schedule (LINEAR), and quadratic schedule (QUAD).AFLGo’s framework [28] implements four kinds of energy scheduling:EXPLORE, LOG, LINEAR, and QUAD.AFLGo slowly transitions from the exploration phase to the exploitation phase, according to the annealing function implemented as a power schedule.A seed’s assigned energy is inversely proportional to the temperature.Although the energy is locally assigned to each seed, the temperature is global to all seeds in the simulated annealing-based power schedule.The cooling schedule, which controls the convergence rate of temperature, decides the timing of entering the exploitation phase from the exploration phase.Therefore, how to accelerate the convergence rate of temperature while maintaining sufficient exploration time is an important focus in this paper.

    The formulas for the temperatureTin the cooling schedules of EXPLORE, LOG, LINEAR,and QUAD are shown, in order, as follows [7,28]:

    wherexis the ratio of execution time to exploration time.

    The cooling curve of the temperatureTis shown in Fig.2, where the abscissa is the above parameterx, and the ordinate isT.

    Figure 2:Cooling schedule of AFLGo

    It can be seen that the convergence rate ofTis significantly different, and it decreases more obviously in the range (0, 0.5) than other ranges.At the same time, the exploration phase must be allowed sufficient time.Although the curve of the power schedule LOG has the highest value of convergence, it does not leave sufficient time for exploration.Therefore, how a better convergence formula forTcan be obtained and the time at which the cooling schedule is to be triggered have become interesting research topics.

    3.2 Cooling Schedule

    We adopt the same value of temperatureTin AFLGo and use it to trigger the fuzzing procedure from the exploration phase into the exploitation phase, i.e., the cooling schedule enters the exploitation phase whenTis less than or equal to 0.05.The exploration time is preset by users.When the ratio of execution time to exploration time is 1, T is 0.05.Once the execution time matches the exploration time, the simulated annealing process is comparable to a classical greedy search algorithm.

    To make the temperature T rapidly fall below 0.05, we proposed a new cooling schedule formula that has better convergence in the open interval (0, 1),

    wherexis the ratio of execution time to exploration time.

    Because exploration time is constant and preset, the execution time is proportional tox.Furthermore, the temperatureTis proportional to execution time, and thus we can express the relationship between temperatureTand execution time byx.This means that the smaller isxwhen the temperatureTdrops to 0.05, the shorter is the execution time.Finally, we can shorten the time of fuzzing.

    As shown in Fig.3, compared with the cooling schedules of EXPLORE, LOG, LINEAR,and QUAD, the proposed new cooling schedule first cools the temperatureTto 0.05 so that we can make the cooling schedule enter the exploitation phase earlier.Therefore, the new cooling schedule can help reduce the execution time of the annealing-based power schedule in each round.

    Figure 3:Comparison of cooling schedules

    3.3 Annealing-Based Power Schedules

    We follow and maintain the annealing-based power schedules in AFLGo, which assigns more energy to seeds that are closer to the target locations and reduces that of seeds that are farther away.Therefore, the distance of a seed to a target basic block is important.The formula of annealing-based power schedules is shown as follow [7,28]:

    where:

    (1)sis a seed;

    (2)BBbis target basic blockb;

    (3) T is the temperature in the cooling schedule;

    (4)Dsbis the distance of seedstoBBb.

    4 FastAFLGo Model

    We develop an improved directed greybox fuzzing model, FastAFLGo, as shown in Fig.4.

    Figure 4:FastAFLGo model

    Before starting the fuzzing of the tested program, we must do the same work as AFLGo to obtain the distance between basic blocks and assign energy to each candidate seed.The process is as follows.

    (1) Based on the component of the graph extractor, the call graph (CG) and control flow graph (CFG) are extracted.

    (2) Based on the CG and CFG, the inter-procedural distances are computed by the component of the distance calculator.

    (3) The distance information is instrumented in each basic block in the target binary by the component of the instrumentor.The information provided by the instrumented binary is not only about coverage but about the seed distance.

    The guidance information is now ready.Algorithm 1 describes the process of directed greybox fuzzing.In the FastAFLGo model, AssignEnergy is replaced with our proposed new energy schedule to assign candidate seeds to different energy.

    ?

    A set of seed inputsSis provided to the Fuzzer, which chooses seedsfromSand determines the number of new inputs by AssignEnergy.The Fuzzer generates e new test cases by mutating seeds.If test cases′is important, e.g., it covers a new branch of the tested program, then it is added toS.If the generated test cases′leads the tested program to crash, then it is added to the CrashSet.

    5 Experiment and Analysis

    We used the LAVA-A dataset, which includes the programs base64, who, uniq, and md5sum,as the unified test set.A large number of vulnerabilities are present in each of these programs.We regard the number of discovered vulnerabilities in a test cycle as an evaluation criterion.We used seven days as a test cycle.

    Experiments were performed on a computer with an Intel Xeon E5-2650 V4 CPU, 16 GB memory, a 1-TB hard disk, and a Ubuntu 16.04 operating system.

    The experimental results are shown in Tabs.1 and 2, which show the total number of crashes and number of unique crashes, respectively, of VUzzer, AFLGo and FastAFLGo.

    Table 1:Total number of crashes discovered

    Table 2:Number of unique crashes discovered

    The results in Tabs.1 and 2 show that FastAFLGo is significantly more effective than AFLGo and VUzzer with the same time cost.

    6 Conclusion and Future Work

    Due to the complexity of software and the growing amount of code, automatic vulnerability discovery has become a research hotspot.Coverage-based fuzzing is an important method of vulnerability discovery.AFLGo is a good method for directed greybox fuzzing.We analyzed its annealing-based power schedule and redesigned cooling schedule corresponding to temperature.Experimental results show that FastAFLGo can discover more vulnerabilities with the time consumption remaining the same.In our future work, we plan to introduce artificial intelligence approaches to identify basic blocks similar to the blocks that confirmed vulnerabilities.

    Funding Statement:This work was supported by the Natural Science Foundation of China (Grant No.61702013), National Key Research and Development Plan (Grant Nos.2018YFB1800302 and 2019YFA0706404), Beijing Natural Science Foundation (Grant Nos.KZ201810009011, 4202020,and 19L2021), and Science and Technology Innovation Project of North China University of Technology (19XN108).

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    .国产精品久久| 免费看光身美女| 我要搜黄色片| 久久亚洲精品不卡| av中文乱码字幕在线| 亚洲av五月六月丁香网| 亚洲精华国产精华液的使用体验 | av在线观看视频网站免费| 久久热精品热| 久久精品91蜜桃| 国产精品人妻久久久久久| 啦啦啦韩国在线观看视频| 久久久久久久久久久丰满| 亚洲欧美日韩卡通动漫| 欧美性猛交黑人性爽| 国产成人福利小说| 99久久无色码亚洲精品果冻| 99热6这里只有精品| 久久九九热精品免费| 亚洲成a人片在线一区二区| 国产精品永久免费网站| 看黄色毛片网站| 久久精品国产99精品国产亚洲性色| 中文字幕免费在线视频6| 久久久精品大字幕| 国产精品一区二区三区四区免费观看 | 亚洲美女视频黄频| 嫩草影院精品99| av卡一久久| 国产真实乱freesex| 日本撒尿小便嘘嘘汇集6| 亚洲人成网站在线播| 最近最新中文字幕大全电影3| 国产激情偷乱视频一区二区| 国产黄片美女视频| 免费av不卡在线播放| 搡老熟女国产l中国老女人| 老熟妇乱子伦视频在线观看| 亚洲精品亚洲一区二区| 婷婷精品国产亚洲av| 久久久a久久爽久久v久久| 亚洲高清免费不卡视频| 97超级碰碰碰精品色视频在线观看| 中文字幕免费在线视频6| 亚洲图色成人| 看片在线看免费视频| 久久久欧美国产精品| 色综合色国产| 村上凉子中文字幕在线| 久久精品影院6| 一区二区三区四区激情视频 | 一边摸一边抽搐一进一小说| 老司机午夜福利在线观看视频| 久久精品国产亚洲av天美| 国产欧美日韩精品一区二区| 久久精品91蜜桃| 亚洲国产精品sss在线观看| 亚洲国产欧洲综合997久久,| 国产精品久久久久久av不卡| 干丝袜人妻中文字幕| 丝袜喷水一区| 午夜视频国产福利| 可以在线观看毛片的网站| 精品福利观看| 欧美日韩在线观看h| 国产高清视频在线观看网站| 亚洲欧美日韩卡通动漫| 午夜激情欧美在线| 日韩大尺度精品在线看网址| 中文亚洲av片在线观看爽| 国产精品福利在线免费观看| 国产精品三级大全| 欧美成人一区二区免费高清观看| 一级黄片播放器| 国产又黄又爽又无遮挡在线| 亚洲色图av天堂| 91午夜精品亚洲一区二区三区| 免费av毛片视频| 噜噜噜噜噜久久久久久91| 六月丁香七月| 特大巨黑吊av在线直播| 国产亚洲精品av在线| 亚洲专区国产一区二区| 色噜噜av男人的天堂激情| 少妇的逼好多水| 久久久精品94久久精品| 国内精品宾馆在线| 日本一本二区三区精品| 国产白丝娇喘喷水9色精品| 天天躁夜夜躁狠狠久久av| 国产精品日韩av在线免费观看| 1024手机看黄色片| 色哟哟哟哟哟哟| 亚洲av免费在线观看| 男人和女人高潮做爰伦理| 午夜精品一区二区三区免费看| 身体一侧抽搐| 18禁在线播放成人免费| 欧美极品一区二区三区四区| 99视频精品全部免费 在线| 久久中文看片网| 久久国内精品自在自线图片| 午夜免费男女啪啪视频观看 | 干丝袜人妻中文字幕| 色5月婷婷丁香| 人妻制服诱惑在线中文字幕| 悠悠久久av| 久久婷婷人人爽人人干人人爱| 一边摸一边抽搐一进一小说| 亚洲人成网站在线观看播放| 精品久久久久久久久亚洲| 日韩av在线大香蕉| 啦啦啦韩国在线观看视频| 日韩精品青青久久久久久| 听说在线观看完整版免费高清| 干丝袜人妻中文字幕| 99久久九九国产精品国产免费| 国产高清激情床上av| 中国美女看黄片| 观看免费一级毛片| 亚洲精品一区av在线观看| 国产黄色小视频在线观看| 人妻久久中文字幕网| av天堂中文字幕网| 国产成人福利小说| 国产69精品久久久久777片| 免费看光身美女| 精品一区二区免费观看| 99久国产av精品国产电影| 免费人成在线观看视频色| 插逼视频在线观看| 免费av不卡在线播放| 国产 一区精品| 天天躁日日操中文字幕| 国产久久久一区二区三区| 三级经典国产精品| 天堂动漫精品| 人妻少妇偷人精品九色| 国产亚洲精品av在线| 精华霜和精华液先用哪个| 久久午夜福利片| 午夜精品一区二区三区免费看| 波多野结衣高清无吗| 日本免费a在线| 九九爱精品视频在线观看| 久久精品91蜜桃| 亚洲最大成人av| 如何舔出高潮| 久久久久久九九精品二区国产| 成人漫画全彩无遮挡| 亚洲人成网站在线播| 精品一区二区三区视频在线观看免费| 舔av片在线| 精品日产1卡2卡| 国产老妇女一区| 女生性感内裤真人,穿戴方法视频| 国产黄色视频一区二区在线观看 | 国产成人a区在线观看| 国内精品美女久久久久久| 最近视频中文字幕2019在线8| 老司机午夜福利在线观看视频| 三级男女做爰猛烈吃奶摸视频| 国产成人福利小说| 一卡2卡三卡四卡精品乱码亚洲| 三级男女做爰猛烈吃奶摸视频| 亚洲内射少妇av| 免费看日本二区| 99视频精品全部免费 在线| 97在线视频观看| 亚洲av不卡在线观看| 中文亚洲av片在线观看爽| 一进一出抽搐gif免费好疼| 成人漫画全彩无遮挡| 如何舔出高潮| 在线观看免费视频日本深夜| 偷拍熟女少妇极品色| 日本在线视频免费播放| 91午夜精品亚洲一区二区三区| 亚洲欧美日韩卡通动漫| 赤兔流量卡办理| 看非洲黑人一级黄片| 亚洲精品国产av成人精品 | 日韩成人av中文字幕在线观看 | 美女大奶头视频| 日本免费a在线| 最近最新中文字幕大全电影3| 日韩精品青青久久久久久| 99久久无色码亚洲精品果冻| 亚洲丝袜综合中文字幕| 久久这里只有精品中国| 久99久视频精品免费| 国内精品一区二区在线观看| 国国产精品蜜臀av免费| 精品久久久久久成人av| 人人妻人人澡欧美一区二区| 国内精品宾馆在线| 一个人看的www免费观看视频| 国产高清视频在线观看网站| 亚洲人成网站在线播| 成人毛片a级毛片在线播放| 亚洲七黄色美女视频| 国内精品久久久久精免费| 国产三级在线视频| 日本欧美国产在线视频| 国产白丝娇喘喷水9色精品| 色哟哟·www| 欧美成人免费av一区二区三区| 久久久久免费精品人妻一区二区| 在线观看一区二区三区| av女优亚洲男人天堂| 一个人看视频在线观看www免费| 国产精品久久久久久精品电影| 亚洲人与动物交配视频| 精品福利观看| 少妇的逼好多水| 如何舔出高潮| 日产精品乱码卡一卡2卡三| 嫩草影院入口| 国产亚洲精品av在线| av免费在线看不卡| 晚上一个人看的免费电影| 日本黄大片高清| 日本免费a在线| 欧美一级a爱片免费观看看| 色在线成人网| 国产亚洲av嫩草精品影院| av在线亚洲专区| av免费在线看不卡| 老司机午夜福利在线观看视频| 人妻夜夜爽99麻豆av| 99国产精品一区二区蜜桃av| 欧美高清成人免费视频www| 一进一出好大好爽视频| aaaaa片日本免费| 小说图片视频综合网站| 69av精品久久久久久| 欧美潮喷喷水| 菩萨蛮人人尽说江南好唐韦庄 | 成人漫画全彩无遮挡| 男女那种视频在线观看| 亚洲成人精品中文字幕电影| 国产中年淑女户外野战色| 亚洲专区国产一区二区| 亚洲aⅴ乱码一区二区在线播放| 成人欧美大片| 免费电影在线观看免费观看| 国产久久久一区二区三区| 日本五十路高清| 禁无遮挡网站| 免费无遮挡裸体视频| 哪里可以看免费的av片| 男女那种视频在线观看| 久久久久久伊人网av| 人妻少妇偷人精品九色| 亚洲中文日韩欧美视频| 精品人妻视频免费看| 亚洲高清免费不卡视频| 少妇熟女aⅴ在线视频| 国产欧美日韩精品亚洲av| 午夜福利成人在线免费观看| 欧美日本亚洲视频在线播放| 最近在线观看免费完整版| 国产精品国产高清国产av| 欧美性猛交黑人性爽| 久久人妻av系列| 黄片wwwwww| 国产黄色视频一区二区在线观看 | 黄色一级大片看看| 亚洲av一区综合| 青春草视频在线免费观看| 欧美bdsm另类| 又爽又黄无遮挡网站| videossex国产| 精品久久久久久久久久久久久| 悠悠久久av| 免费人成视频x8x8入口观看| 午夜日韩欧美国产| 亚洲av免费在线观看| 女的被弄到高潮叫床怎么办| 在线观看av片永久免费下载| 精品久久久久久久末码| 成人高潮视频无遮挡免费网站| 久久人人爽人人爽人人片va| 一本精品99久久精品77| eeuss影院久久| 人妻少妇偷人精品九色| 亚洲专区国产一区二区| 日韩av在线大香蕉| 久久精品国产亚洲av涩爱 | 久久6这里有精品| 成人精品一区二区免费| 日韩三级伦理在线观看| 色尼玛亚洲综合影院| 欧美又色又爽又黄视频| 久久久色成人| 亚洲电影在线观看av| 一个人观看的视频www高清免费观看| 成人精品一区二区免费| 九色成人免费人妻av| 久久久久精品国产欧美久久久| 深夜a级毛片| 国产美女午夜福利| 精品熟女少妇av免费看| 久久午夜福利片| 伦精品一区二区三区| 亚洲熟妇中文字幕五十中出| 真实男女啪啪啪动态图| 香蕉av资源在线| 亚洲欧美精品综合久久99| 国产高清视频在线播放一区| 在现免费观看毛片| 女同久久另类99精品国产91| 夜夜爽天天搞| 婷婷亚洲欧美| 69av精品久久久久久| 欧美+日韩+精品| 国产一区二区亚洲精品在线观看| 国内精品久久久久精免费| 国产精品,欧美在线| 欧美另类亚洲清纯唯美| 日本 av在线| 女人被狂操c到高潮| 日韩一本色道免费dvd| 亚洲最大成人手机在线| 精品一区二区三区人妻视频| av在线播放精品| 精品国内亚洲2022精品成人| 久久婷婷人人爽人人干人人爱| 久久草成人影院| 久久欧美精品欧美久久欧美| 日本撒尿小便嘘嘘汇集6| 日韩一本色道免费dvd| 国产淫片久久久久久久久| 免费观看在线日韩| 亚洲av免费高清在线观看| 亚洲中文字幕日韩| 国产成人影院久久av| 黄色日韩在线| 嫩草影院入口| 国产精品亚洲一级av第二区| 99riav亚洲国产免费| 大香蕉久久网| 国产高清有码在线观看视频| 99久久九九国产精品国产免费| 日本a在线网址| 搡老熟女国产l中国老女人| 少妇的逼好多水| 免费观看精品视频网站| 国产精品三级大全| 国产在线男女| 天堂√8在线中文| 人妻丰满熟妇av一区二区三区| 91麻豆精品激情在线观看国产| 国产av一区在线观看免费| 搡女人真爽免费视频火全软件 | 亚洲激情五月婷婷啪啪| 欧美色欧美亚洲另类二区| 中文字幕av成人在线电影| 国产片特级美女逼逼视频| 国产极品精品免费视频能看的| 日韩欧美精品免费久久| 高清午夜精品一区二区三区 | 淫妇啪啪啪对白视频| 精品乱码久久久久久99久播| 99热这里只有是精品50| 国产国拍精品亚洲av在线观看| 国产精品一区二区免费欧美| 九色成人免费人妻av| 99精品在免费线老司机午夜| 国产一区二区在线av高清观看| 中文字幕久久专区| 亚洲精品粉嫩美女一区| 国产激情偷乱视频一区二区| 听说在线观看完整版免费高清| 亚洲欧美成人精品一区二区| 天美传媒精品一区二区| 久久久久国产网址| 一个人观看的视频www高清免费观看| 免费无遮挡裸体视频| 嫩草影院入口| 免费观看在线日韩| 国产人妻一区二区三区在| 久久热精品热| 麻豆av噜噜一区二区三区| 无遮挡黄片免费观看| 老司机午夜福利在线观看视频| 18禁黄网站禁片免费观看直播| 成熟少妇高潮喷水视频| 亚洲综合色惰| 日韩大尺度精品在线看网址| 综合色av麻豆| 欧美激情国产日韩精品一区| 岛国在线免费视频观看| .国产精品久久| 最后的刺客免费高清国语| 欧美日韩综合久久久久久| 亚洲欧美清纯卡通| 人妻夜夜爽99麻豆av| 精品欧美国产一区二区三| 成人av一区二区三区在线看| 最近的中文字幕免费完整| 日日啪夜夜撸| 久久精品国产亚洲网站| 国产精品无大码| 亚洲av不卡在线观看| 热99在线观看视频| 亚洲天堂国产精品一区在线| 国产av不卡久久| 麻豆一二三区av精品| 乱人视频在线观看| 大香蕉久久网| 午夜福利视频1000在线观看| 大型黄色视频在线免费观看| 久久99热6这里只有精品| 国产精品无大码| 亚洲av电影不卡..在线观看| 久久久久久久久大av| 亚洲在线自拍视频| 久久精品综合一区二区三区| 尾随美女入室| 免费搜索国产男女视频| 人人妻人人澡人人爽人人夜夜 | .国产精品久久| 亚洲欧美清纯卡通| 国产高潮美女av| 亚洲国产精品成人久久小说 | 国产精品女同一区二区软件| 亚洲色图av天堂| 最近手机中文字幕大全| 22中文网久久字幕| 成人二区视频| 久久久久久伊人网av| 亚洲人成网站在线播| 欧美日韩在线观看h| 非洲黑人性xxxx精品又粗又长| 国产精品综合久久久久久久免费| 免费在线观看成人毛片| 一级a爱片免费观看的视频| 成年av动漫网址| 丰满人妻一区二区三区视频av| 国产精品电影一区二区三区| 一级毛片久久久久久久久女| 国产精品1区2区在线观看.| 久久国内精品自在自线图片| 亚洲精品日韩在线中文字幕 | 白带黄色成豆腐渣| 国内精品宾馆在线| 国产av在哪里看| 欧美成人免费av一区二区三区| 一进一出好大好爽视频| 国产av麻豆久久久久久久| 18禁在线播放成人免费| 亚洲精品一卡2卡三卡4卡5卡| 俺也久久电影网| 悠悠久久av| 久久99热6这里只有精品| 日韩精品有码人妻一区| 午夜精品一区二区三区免费看| a级毛片a级免费在线| 日本三级黄在线观看| 婷婷六月久久综合丁香| 99精品在免费线老司机午夜| 国产黄色小视频在线观看| 两个人视频免费观看高清| 国产精品不卡视频一区二区| 狂野欧美激情性xxxx在线观看| 成人永久免费在线观看视频| 欧美成人a在线观看| 亚洲第一区二区三区不卡| 国产美女午夜福利| 国产一区二区在线观看日韩| 国产高清三级在线| 久久久久久久久大av| 久久精品国产亚洲av天美| 在线免费观看的www视频| 亚洲欧美日韩高清在线视频| 久久久久久久久久黄片| 国产色爽女视频免费观看| 天堂√8在线中文| 国产伦一二天堂av在线观看| 最后的刺客免费高清国语| 国产爱豆传媒在线观看| 老司机福利观看| 亚洲av美国av| 日日摸夜夜添夜夜添av毛片| 搡老妇女老女人老熟妇| 在线观看免费视频日本深夜| 在线免费观看不下载黄p国产| 久久国产乱子免费精品| 日本一本二区三区精品| 99九九线精品视频在线观看视频| 三级男女做爰猛烈吃奶摸视频| 久99久视频精品免费| 一级a爱片免费观看的视频| 久久人妻av系列| 日韩强制内射视频| 亚洲精品一卡2卡三卡4卡5卡| 成人av在线播放网站| 亚洲美女黄片视频| 亚洲第一电影网av| 有码 亚洲区| 两性午夜刺激爽爽歪歪视频在线观看| 春色校园在线视频观看| 神马国产精品三级电影在线观看| 别揉我奶头 嗯啊视频| 精品久久国产蜜桃| 99久久九九国产精品国产免费| 亚洲欧美日韩高清专用| 日本色播在线视频| 久久人妻av系列| 亚洲国产欧美人成| 看免费成人av毛片| 麻豆成人午夜福利视频| 少妇被粗大猛烈的视频| 免费人成在线观看视频色| 最近中文字幕高清免费大全6| 亚洲第一区二区三区不卡| 夜夜夜夜夜久久久久| 久久99热这里只有精品18| 成人精品一区二区免费| 亚洲五月天丁香| 99久久久亚洲精品蜜臀av| 女人被狂操c到高潮| 国产精品国产三级国产av玫瑰| 亚洲国产日韩欧美精品在线观看| 18禁裸乳无遮挡免费网站照片| 日日啪夜夜撸| 一本精品99久久精品77| 18禁在线播放成人免费| 欧美日韩一区二区视频在线观看视频在线 | 卡戴珊不雅视频在线播放| 国内精品美女久久久久久| 一级av片app| 亚洲熟妇中文字幕五十中出| 国内精品一区二区在线观看| 午夜爱爱视频在线播放| 成人国产麻豆网| 真人做人爱边吃奶动态| 久久天躁狠狠躁夜夜2o2o| 久久精品人妻少妇| 在线播放国产精品三级| 淫秽高清视频在线观看| 欧美区成人在线视频| 99热这里只有是精品在线观看| 国产精品,欧美在线| 欧美日韩国产亚洲二区| 国内精品宾馆在线| 五月伊人婷婷丁香| 国产欧美日韩精品一区二区| av卡一久久| 久久欧美精品欧美久久欧美| 亚洲天堂国产精品一区在线| 丰满乱子伦码专区| 久久久久久久久久成人| 日韩av在线大香蕉| 国产视频一区二区在线看| 一本一本综合久久| 欧美日本亚洲视频在线播放| 成人美女网站在线观看视频| 亚洲七黄色美女视频| 国产精品综合久久久久久久免费| 亚洲不卡免费看| 国产精品爽爽va在线观看网站| 女同久久另类99精品国产91| 干丝袜人妻中文字幕| 国产男人的电影天堂91| 国产成人freesex在线 | 婷婷色综合大香蕉| a级一级毛片免费在线观看| 亚洲婷婷狠狠爱综合网| 神马国产精品三级电影在线观看| 国产又黄又爽又无遮挡在线| 嫩草影院新地址| 在线观看免费视频日本深夜| 99在线视频只有这里精品首页| 亚洲精品成人久久久久久| 日日摸夜夜添夜夜添小说| 久久韩国三级中文字幕| av天堂在线播放| 国产综合懂色| 狠狠狠狠99中文字幕| ponron亚洲| av黄色大香蕉| 欧美一区二区亚洲| 亚洲中文字幕一区二区三区有码在线看| 欧美成人免费av一区二区三区| 国国产精品蜜臀av免费| 插逼视频在线观看| 99久国产av精品| 久久久久久久午夜电影| 在线天堂最新版资源| 亚洲欧美精品综合久久99| 色综合站精品国产| 亚洲中文字幕日韩| 女的被弄到高潮叫床怎么办| 亚洲精品国产成人久久av| 熟女电影av网| 欧美成人免费av一区二区三区| 欧美一区二区国产精品久久精品| 国产亚洲精品久久久久久毛片| 极品教师在线视频| 色哟哟·www| 国产熟女欧美一区二区| 亚洲av不卡在线观看| 国产一区二区三区在线臀色熟女| 永久网站在线| 国产久久久一区二区三区| 超碰av人人做人人爽久久| 精品一区二区三区人妻视频| 欧美国产日韩亚洲一区| 观看美女的网站| 国产爱豆传媒在线观看| 老女人水多毛片| 日本a在线网址| 神马国产精品三级电影在线观看|