نتایج جستجو برای: protocol fuzzing

تعداد نتایج: 250258  

2017
Isak Hjelt

Society are becoming more dependent on software, and more artifacts are being connected to the Internet each day[31]. This makes the work of tracking down vulnerabilities in software a moral obligation for software developers. Since manual testing is expensive[7], automated bug finding techniques are attractive within the quality assurance field, since it can save companies a lot of money. This...

2017
Toon Lenaerts

With the scale and use of the Internet nowadays, it is crucial that we can effectively test the correctness and security of systems that handle our personal data. In this thesis, we improve upon a previous work by Verleg. Verleg used protocol state fuzzing to test several implementations of the SSH protocol. By adapting a more formal methodology, we achieve higher confidence in our results. We ...

2009
Ari Takanen

Software is bound to have security critical flaws, and no testing or code auditing can ensure that software is flawless. But software security testing requirements have improved radically during the past years, largely due to criticism from security conscious consumers and Enterprise customers. Whereas in the past, security flaws were taken for granted (and patches were quietly and humbly insta...

Journal: :CoRR 2017
Saahil Ognawala Thomas Hutzelmann Eirini Psallida Alexander Pretschner

Fuzzing and symbolic execution are popular techniques for finding vulnerabilities and generating test-cases for programs. Fuzzing, a blackbox method that mutates seed input values, is generally incapable of generating diverse inputs that exercise all paths in the program. Due to the path-explosion problem and dependence on SMT solvers, symbolic execution may also not achieve high path coverage....

2013
Maxim Shudrak Vyacheslav Zolotarev

The article describes dynamic analysis techniques and cloud-based platform for software security and reliability testing. In the article the author contributes to dynamic execution analysis techniques. In the first part of the article the authors describe the technique of dynamic binary analysis which is referred to as «fuzzing». The authors show basic architecture of the tool for security and ...

Journal: :Journal of Physics: Conference Series 2021

2010
Sheila Becker Humberto J. Abdelnur Radu State Thomas Engel

The current underutilization of IPv6 enabled services makes accesses to them very attractive because of higher availability and better response time, like the IPv6 specific services from Google and Youtube have recently got a lot of requests. In this paper, we describe a fuzzing framework for IPv6 protocols. Fuzzing is a process by which faults are injected in order to find vulnerabilities in i...

2013
William Johansson Martin Svensson Ulf E. Larson

The telecommunication network is classified by governments as a critical infrastructure which must be protected. It provides text and voice communication, Internet access, and emergency services for mobile subscribers worldwide. Operators set high demands on the availability of the telecommunication products and a common level to mark high availability is 99.999%, or less than five and a half m...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید