Synthesis of Linux Kernel Fuzzing Tools Based on Syscall
نویسندگان
چکیده
منابع مشابه
STAB Fuzzing: A Study of Android’s Binder IPC and Linux/Android Fuzzing
This paper focuses on describing the necessary background to begin working with Binder: Android’s Interprocess Communication (IPC) mechanism, and Linux/Android system call (“syscall”) fuzzing tools. The objective was to study Android and Binder along with system call fuzzing in order to learn more about Android, Binder IPC, and vulnerability detection and analysis. Our study was further concent...
متن کاملImproving Usability of the Linux Kernel Configuration Tools
Tailoring a Linux kernel to one’s needs has been one of the most cumbersome tasks a GNU/Linux user can do. There have been many attempts to overcome this problem by introducing smarter configuration tools. Those tools, however, still lack some important features which discourages users from using them. In this project, we address the problem of usability of the Linux kernel configuration tools....
متن کاملUsing Code Coverage Tools in the Linux Kernel
Defining software reliability is hard enough, let alone ensuring it. However, most all software developers agree on the importance of testing. The often unspoken assumption with testing is that the test programs cover a majority of the source code written. A test covers a line of code if running the test executes the line. Coverage analysis measures how much of the target code is run during a t...
متن کاملVersion Management Tools: CVS to BK in the Linux Kernel
Version management tools might be seen as a prerequisite for open source development today as projects become too large to be managed by maintainers alone. Yet the OS process depends on fluid coordination and collaboration, with the underlying qualities of this process based on firm trust and respect for fellow developers. This paper is a study of how debate over version tools reflects governan...
متن کاملTools Support for Linux Kernel Deductive Verification Workflow
Errors in critically important systems may become very expensive. If such systems must provide confidentiality when working with some critically important data such as classified information or private know-how, an error cost may become difficult to evaluate. For these systems, formal verification methods should be used to prove they are error-free. In the paper, a case of formal verification o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: DEStech Transactions on Computer Science and Engineering
سال: 2017
ISSN: 2475-8841
DOI: 10.12783/dtcse/aiea2017/14990