• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 190
Next 10 →

Automated Whitebox Fuzz Testing

by Patrice Godefroid, Michael Y. Levin, David Molnar
"... Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a program and test the resulting values. We present an alternative whitebox fuzz testing approach inspired by recent advances in ..."
Abstract - Cited by 311 (25 self) - Add to MetaCart
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a program and test the resulting values. We present an alternative whitebox fuzz testing approach inspired by recent advances

Genetic Programming

by John R. Koza , 1997
"... Introduction Genetic programming is a domain-independent problem-solving approach in which computer programs are evolved to solve, or approximately solve, problems. Genetic programming is based on the Darwinian principle of reproduction and survival of the fittest and analogs of naturally occurring ..."
Abstract - Cited by 1056 (12 self) - Add to MetaCart
genetic operations such as crossover (sexual recombination) and mutation. John Holland's pioneering Adaptation in Natural and Artificial Systems (1975) described how an analog of the evolutionary process can be applied to solving mathematical problems and engineering optimization problems using what

SecFuzz: Fuzz-testing Security Protocols

by Petar Tsankov, Mohammad Torabi Dashti, David Basin - In 7th International Workshop on Automation of Software Test (AST ’12 , 2012
"... Abstract—We propose a light-weight, yet effective, technique for fuzz-testing security protocols. Our technique is modular, it exercises (stateful) protocol implementations in depth, and handles encrypted traffic. We use a concrete implementation of the protocol to generate valid inputs, and mutate ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
Abstract—We propose a light-weight, yet effective, technique for fuzz-testing security protocols. Our technique is modular, it exercises (stateful) protocol implementations in depth, and handles encrypted traffic. We use a concrete implementation of the protocol to generate valid inputs, and mutate

Perspectives: Complex Adaptations and the Evolution of Evolvability

by Günter P. Wagner, Lee Altenberg , 1996
"... The problem of complex adaptations is studied in two largely disconnected research traditions: evolutionary biology and evolutionary computer science. This paper summarizes the results from both areas and compares their implications. In evolutionary computer science it was found that the Darwinian p ..."
Abstract - Cited by 223 (8 self) - Add to MetaCart
process of mutation, recombination and selection is not universally effective in improving complex systems like computer programs or chip designs. For adaptation to occur, these systems must possess "evolvability", i.e. the ability of random variations to sometimes produce improvement

Optimizing Seed Selection for Fuzzing

by Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, David Brumley - in Proceedings of the USENIX Security Symposium, 2014
"... Randomly mutating well-formed program inputs or sim-ply fuzzing, is a highly effective and widely used strategy to find bugs in software. Other than showing fuzzers find bugs, there has been little systematic effort in understand-ing the science of how to fuzz properly. In this paper, we focus on ho ..."
Abstract - Cited by 4 (2 self) - Add to MetaCart
Randomly mutating well-formed program inputs or sim-ply fuzzing, is a highly effective and widely used strategy to find bugs in software. Other than showing fuzzers find bugs, there has been little systematic effort in understand-ing the science of how to fuzz properly. In this paper, we focus

Hybrid Fuzz Testing: Discovering Software Bugs via Fuzzing and Symbolic Execution

by Brian S. Pak , 2012
"... Random mutational fuzz testing (fuzzing) and symbolic executions are program testing techniques that have been gaining popularity in the security research community. Fuzzing finds bugs in a target program by natively executing it with random inputs while mon-itoring the execution for abnormal behavi ..."
Abstract - Add to MetaCart
Random mutational fuzz testing (fuzzing) and symbolic executions are program testing techniques that have been gaining popularity in the security research community. Fuzzing finds bugs in a target program by natively executing it with random inputs while mon-itoring the execution for abnormal

Random testing for security: blackbox vs. whitebox fuzzing

by Patrice Godefroid - In RT ’07: Proceedings of the 2nd international workshop on Random testing , 2007
"... Fuzz testing is an effective technique for finding security vulnerabilities in software. Fuzz testing is a form of blackbox random testing which randomly mutates well-formed inputs and tests the program on the resulting data. In some cases, grammars are used to randomly generate the well-formed inpu ..."
Abstract - Cited by 13 (0 self) - Add to MetaCart
Fuzz testing is an effective technique for finding security vulnerabilities in software. Fuzz testing is a form of blackbox random testing which randomly mutates well-formed inputs and tests the program on the resulting data. In some cases, grammars are used to randomly generate the well

MuJava : An automated class mutation system

by Yu-seung Ma, Jeff Offutt, Yong Rae Kwon - Journal of Software Testing, Verification and Reliability , 2005
"... Several module and class testing techniques have been applied to object-oriented programs, but researchers have only recently begun developing test criteria that evaluate the use of key OO features such as inheritance, polymorphism, and encapsulation. Mutation testing is a powerful testing technique ..."
Abstract - Cited by 122 (14 self) - Add to MetaCart
Several module and class testing techniques have been applied to object-oriented programs, but researchers have only recently begun developing test criteria that evaluate the use of key OO features such as inheritance, polymorphism, and encapsulation. Mutation testing is a powerful testing

A New Fuzzing Technique for Software Vulnerability Mining

by Zhiyong Wu, J. William Atwood, Xueyong Zhu
"... Abstract- Test case mutation and generation (m&g) based on data samples is an effective way to generate test cases for Knowledge-based fuzzing, but present m&g technique is only capable of one-dimensional m&g at a time, based on a data sample, and thus it is impossible to find a vulnerab ..."
Abstract - Add to MetaCart
Abstract- Test case mutation and generation (m&g) based on data samples is an effective way to generate test cases for Knowledge-based fuzzing, but present m&g technique is only capable of one-dimensional m&g at a time, based on a data sample, and thus it is impossible to find a

Combining McCabe IQ with Fuzz TestingCombining McCabe IQ with Fuzz Testing

by unknown authors
"... Fuzz testing, or fuzzing, is a black-box testing technique that has recently leapt to prominence as a quick and cost effective method for uncovering security bugs. Over 70 % of security vulnerabilities Microsoft patched in 2006 were found by fuzzing 1. This approach involves randomly mutating well-f ..."
Abstract - Add to MetaCart
Fuzz testing, or fuzzing, is a black-box testing technique that has recently leapt to prominence as a quick and cost effective method for uncovering security bugs. Over 70 % of security vulnerabilities Microsoft patched in 2006 were found by fuzzing 1. This approach involves randomly mutating well
Next 10 →
Results 1 - 10 of 190
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University