Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting

ACSAC(2007)

引用 149|浏览266
暂无评分
摘要
We present an extension of traditional "black box" fuzz testing using a genetic algorithm based upon a dynamic Markov model fitness heuristic. This heuristic allows us to "intelligently" guide input selection based upon feedback concerning the "success" of past inputs that have been tried. Unlike many software testing tools, our implementation is strictly based upon binary code and does not require that source code be available. Our evaluation on a Windows server program shows that this approach is superior to random black box fuzzing for increasing code coverage and depth of penetration into program control flow logic. As a result, the technique may be beneficial to the development of future automated vulnerability analysis tools.
更多
查看译文
关键词
windows server program,program testing,dynamic markov model,automated vulnerability analysis tool,binary code,black box fuzz testing,program control flow logic,genetic algorithm,genetic algorithms,fitness heuristic,software testing tool,program control structures,markov processes,security of data,software testing,vulnerability analysis,markov model,source code,control flow,code coverage
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要