نتایج جستجو برای: protocol fuzzing

تعداد نتایج: 250258  

2012
Taeseung Lee Giyoun Won Seongje Cho Namje Park Dongho Won

The paper proposes a security testing technique to detect known vulnerabilities of web applications using both static and dynamic analysis. We also present a process to improve the security of web applications by mitigating many of the vulnerabilities revealed in the testing phase, and address a new method for detecting unknown vulnerabilities by applying dynamic black-box testing based on a fu...

2012
Richard McNally Ken Yiu Duncan Grove Damien Gerhardy

Fuzzing is an approach to software testing where the system being tested is bombarded with test cases generated by another program. The system is then monitored for any flaws exposed by the processing of this input. While the fundamental principles of fuzzing have not changed since the term was first coined, the complexity of the mechanisms used to drive the fuzzing process have undergone signi...

Journal: :Electronics 2023

With the rapid development of Industrial Internet Things (IIoT), programmable logic controllers (PLCs) are becoming increasingly intelligent, leading to improved productivity. However, this also brings about a growing number security vulnerabilities. As result, efficiently identifying potential vulnerabilities in PLCs has become crucial research topic for researchers. This article proposes meth...

2015
Maxim Shudrak Vyacheslav Zolotarev

Vulnerable software represents a tremendous threat to modern information systems. Vulnerabilities in widespread applications may be used to spread malware, steal money and conduct target attacks. To address this problem, developers and researchers use different approaches of dynamic and static software analysis; one of these approaches is called fuzzing. Fuzzing is performed by generating and s...

Journal: :CoRR 2018
Konstantin Böttinger Patrice Godefroid Rishabh Singh

Fuzzing is the process of finding security vulnerabilities in input-processing code by repeatedly testing the code with modified inputs. In this paper, we formalize fuzzing as a reinforcement learning problem using the concept of Markov decision processes. This in turn allows us to apply state-of-theart deep Q-learning algorithms that optimize rewards, which we define from runtime properties of...

Journal: :CoRR 2017
Saahil Ognawala Ana Petrovska Kristian Beckers

Recent efforts in practical symbolic execution have successfully mitigated the path-explosion problem to some extent with search-based heuristics and compositional approaches. Similarly, due to an increase in the performance of cheap multi-core commodity computers, fuzzing as a viable method of random mutation-based testing has also seen promise. However, the possibility of combining symbolic e...

2017
Shameng Wen Qingkun Meng Chao Feng Chaojing Tang

Formal techniques have been devoted to analyzing whether network protocol specifications violate security policies; however, these methods cannot detect vulnerabilities in the implementations of the network protocols themselves. Symbolic execution can be used to analyze the paths of the network protocol implementations, but for stateful network protocols, it is difficult to reach the deep state...

Journal: :Empirical Software Engineering 2022

Fuzzing network servers is a technical challenge, since the behavior of target server depends on its state over sequence multiple messages. Existing solutions are costly and difficult to use, as they rely manually-customized artifacts such protocol models, parsers, learning frameworks. The aim this work develop greybox fuzzer (StateaAFL) for that only relies lightweight analysis program, with n...

Journal: :Electronics 2023

Network protocols, as the communication rules among computer network devices, are foundation for normal operation of networks. However, security issues arising from design flaws and implementation vulnerabilities in protocols pose significant risks to operations security. protocol fuzzing is an effective technique discovering mitigating protocols. It offers unparalleled advantages compared othe...

Journal: :Digital threats 2023

Zigbee is widely adopted as a resource-efficient wireless protocol in the IoT network. devices from manufacturers have recently been affected due to major vulnerabilities implementations. Security testing of implementations becoming increasingly important. However, applying existing vulnerability detection techniques such fuzzing not simple task. Dealing with low-level hardware events still rem...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید