Finding Software Vulnerabilities by Smart Fuzzing - IMAG Accéder directement au contenu
Communication Dans Un Congrès Année : 2011

Finding Software Vulnerabilities by Smart Fuzzing

Sofia Bekrar
  • Fonction : Auteur
  • PersonId : 945113
Chaouki Bekrar
  • Fonction : Auteur
  • PersonId : 945114
Laurent Mounier
  • Fonction : Auteur
  • PersonId : 858856

Résumé

Nowadays, one of the most effective ways to identify software vulnerabilities by testing is the use of fuzzing, whereby the robustness of software is tested against invalid inputs that play on implementation limits or data boundaries. A high number of random combinations of such inputs are sent to the system through its interfaces. Although fuzzing is a fast technique which detects real errors, its efficiency should be improved. Indeed, the main drawbacks of fuzz testing are its poor coverage which involves missing many errors, and the quality of tests. Enhancing fuzzing with advanced approaches such as: data tainting and coverage analysis would improve its efficiency and make it smarter. This paper will present an idea on how these techniques when combined give better error detection by iteratively guiding executions and generating the most pertinent test cases able to trigger potential vulnerabilities and maximize the coverage of testing.
Fichier non déposé

Dates et versions

hal-00860801 , version 1 (11-09-2013)

Identifiants

Citer

Sofia Bekrar, Chaouki Bekrar, Roland Groz, Laurent Mounier. Finding Software Vulnerabilities by Smart Fuzzing. ICST2011 - IEEE 4th International Conference on Software Testing, Verification and Validation, Mar 2011, Berlin, Germany. pp.427-430, ⟨10.1109/ICST.2011.48⟩. ⟨hal-00860801⟩
399 Consultations
0 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More