نتایج جستجو برای: protocol fuzzing

تعداد نتایج: 250258  

2016
Nick Stephens John Grosen Christopher Salls Andrew Dutcher Ruoyu Wang Jacopo Corbetta Yan Shoshitaishvili Christopher Krügel Giovanni Vigna

Memory corruption vulnerabilities are an everpresent risk in software, which attackers can exploit to obtain unauthorized access to confidential information. As products with access to sensitive data are becoming more prevalent, the number of potentially exploitable systems is also increasing, resulting in a greater need for automated software vetting tools. DARPA recently funded a competition,...

Journal: :Proceedings of the ... AAAI Conference on Artificial Intelligence 2022

Fuzzing is a widely-used testing technique to assure software robustness. However, automatic generation of high-quality test suites challenging, especially for that takes in highly-structured inputs, such as the compilers. Compiler fuzzing remains difficult generating tons syntactically and semantically valid programs not trivial. Most previous methods either depend on human-crafted grammars or...

Journal: :Security and Communication Networks 2022

The security research on Windows has received little attention in the academic circle. Most of new methods are usually designed for Linux system and difficult to transplant Windows. Fuzzing programs always suffers from its closed source. Therefore, we need find an appropriate way achieve feedback programs. To our knowledge, there no stable scalable static instrumentation tools yet, dynamic tool...

Journal: :Trudy Instituta sistemnogo programmirovaniâ 2022

Fuzzing as a part of the continuous integration is necessary tool, aimed primarily at providing confidence in software being developed. At same time, presence significant amounts source code, fuzzing becomes resource-intensive task. That’s why increasing efficiency to reach needed code sections more quickly without reducing quality an important line research. The article deals with approaches i...

Journal: :Proceedings of the ACM on programming languages 2023

Coverage-guided fuzzing is one of the most effective approaches for discovering software defects and vulnerabilities. It executes all mutated tests from seed inputs to expose coverage-increasing tests. However, executing incurs significant performance penalties---most are discarded because they do not increase code coverage. Thus, determining if a test increases coverage without actually it ben...

Journal: :Journal of the Textile Machinery of Japan - Proceedings - 1965

Journal: :IEEE Access 2021

Fuzzing is a widely used technique to discover vulnerabilities in software. However, for programs requiring highly structured inputs, the byte-based mutation strategies existing fuzzers have difficulties generating valid inputs. To resolve this challenge, Grammar-Based (GBF) utilizes grammar specifications generate new Some GBFs perform based on Abstract Syntax Trees (ASTs), which can inputs co...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید