Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) 2007
DOI: 10.1109/acsac.2007.27
|View full text |Cite
|
Sign up to set email alerts
|

Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting

Abstract: We present an extension of traditional "black box" fuzz testing using a genetic algorithm based upon a Dynamic Markov Model fitness heuristic. This heuristic allows us to "intelligently" guide input selection based upon feedback concerning the "success" of past inputs that have been tried. Unlike many software testing tools, our implementation is strictly based upon binary code and does not require that source code be available. Our evaluation on a Windows server program shows that this approach is superior to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 62 publications
(27 citation statements)
references
References 5 publications
0
24
0
Order By: Relevance
“…The use of evolutionary algorithms for input generation purposes is a well-explored research area in software engineering [7], [34]. There have been attempts to use evolutionary algorithms for input generation to discover vulnerabilities in applications [25], [42], [45]. The difference lies in the fact that these approaches assume a-priori knowledge of the application to focus on the paths leading to vulnerable parts of the program.…”
Section: A Search-based Evolutionary Input Generationmentioning
confidence: 99%
“…The use of evolutionary algorithms for input generation purposes is a well-explored research area in software engineering [7], [34]. There have been attempts to use evolutionary algorithms for input generation to discover vulnerabilities in applications [25], [42], [45]. The difference lies in the fact that these approaches assume a-priori knowledge of the application to focus on the paths leading to vulnerable parts of the program.…”
Section: A Search-based Evolutionary Input Generationmentioning
confidence: 99%
“…Dowser [24] performs static analysis at compile time to find vulnerable code like loops and pointers, so as QTEP [54]. Sparks et al [49] extracts the control flow graphs from the target to help input generation. Steelix [33] and VUzzer [43] analyze magic values, immediate values, and strings that can affect control flow.…”
Section: Related Workmentioning
confidence: 99%
“…Some other researches focus on analyzing the software vulnerabilities that may cause serious threats. Network security assessment, reversed engineering, or fuzz testing [3][4] [5] are often used in these researches to find out vulnerabilities and threats. The followings are some of the well-known vulnerability scoring standard and vulnerabilities database:…”
Section: A Security Audit and Assessment Mechanismsmentioning
confidence: 99%