2012 IEEE Fifth International Conference on Software Testing, Verification and Validation 2012
DOI: 10.1109/icst.2012.182
|View full text |Cite
|
Sign up to set email alerts
|

A Taint Based Approach for Smart Fuzzing

Abstract: International audienceFuzzing is one of the most popular test-based software vulnerability detection techniques. It consists in running the target application with dedicated inputs in order to exhibit potential failures that could be exploited by a malicious user. In this paper we propose a global approach for fuzzing, addressing the main challenges to be faced in an industrial context: large-size applications, without source code access, and with a partial knowledge of the input specifications. This approach … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
36
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 50 publications
(36 citation statements)
references
References 15 publications
0
36
0
Order By: Relevance
“…Probably the first and also most successful application of gray-box fuzzing is SAGE from Microsoft [47,48], which combines symbolic execution (a static source code analysis technique) and dynamic testing. This combination is today known as concolic testing and inspired several advanced security testing e.g., [12,1], as well as functional test approaches.…”
Section: Fuzzingmentioning
confidence: 99%
See 1 more Smart Citation
“…Probably the first and also most successful application of gray-box fuzzing is SAGE from Microsoft [47,48], which combines symbolic execution (a static source code analysis technique) and dynamic testing. This combination is today known as concolic testing and inspired several advanced security testing e.g., [12,1], as well as functional test approaches.…”
Section: Fuzzingmentioning
confidence: 99%
“…Besides SAGE, there are also other approaches that share the same basic concept: using instrumentation or static analyses of the implementation to improve the quality, efficiency, or effectiveness of dynamic security testing. For example, [12] uses a binary taint analysis to increase the fuzz testing coverage while [54] uses symbolic execution to achieve the same goal. Gray-box fuzzing is also successfully applied to commercial operating system [87].…”
Section: The Second Tier: Java-based Server Applicationsmentioning
confidence: 99%
“…If the process is stopped by the conditional statement, the concolic engine is used to guide the next section and the fuzzer takes over again and searches for vulnerabilities in the deep path more quickly. Driller is a hybrid fuzzing tool using AFL (American Fuzzy Lop) [9] and Angr [18]. AFL is a fuzzer that generates and transforms input values through a genetic algorithm and Angr is an engine that performs symbol execution by converting binary codes into Valgrind's VEX IR, which is also known by Mayhem and S2E [19] as the most optimized symbol execution engine.…”
Section: Hybrid Fuzzingmentioning
confidence: 99%
“…The test case creation speed is fast because it is simple to change the input value; however, it is difficult to find a valid crash because the code coverage is narrow. Smart Fuzzing is a technology that generates input values suitable for the format through target software analysis and the generation of errors [6][7][8][9]. Smart fuzzing has the advantage of knowing where errors can occur through a software analysis.…”
Section: Fuzzingmentioning
confidence: 99%
“…• Fuzzing is a automatic generation of a large number of test cases ( (Lancia, 2011), (Bekrar et al, 2012) or (Alimi et al, 2014). ).…”
Section: Introductionmentioning
confidence: 99%