期刊文献+

PyFuzzer:自动化高效内存模糊测试方法 被引量:3

PyFuzzer:automatic in-memory fuzz testing method
下载PDF
导出
摘要 针对传统模糊测试(fuzz testing)耗时、无法绕过有效性验证等缺陷,提出了基于快速内存模糊测试,综合运用静态分析和动态跟踪技术的测试工具—PyFuzzer。整个过程高度自动化,通过WarFTPD、Serv-U等程序进行测试,并和4n FTP Fuzzer进行对比,结果表明PyFuzzer能有效地发掘二进制程序中的各种漏洞,极大地提高了模糊测试的效率。 Fuzz Testing is an effective method to mine all kinds of vulnerabilities. But the main drawbacks to current fuzz testing tools are: firstly, it produces high volume testing data and it's extraordinary time consumption; secondly, if the accessing needs authentication, the greatest part of test data will be abandoned. PyFuzzer, a novel automatic in-memory fuzz testing tool combining static analysis, dynamic analysis and in-memory fuzz testing, was presented. The tool is highly automatic and effective. Compared with 4n FTP Fuzzer in testing WarFTPD and Serv-U, PyFuzzer can discover all vulnerabilities and improve test efficiency greatly.
出处 《通信学报》 EI CSCD 北大核心 2013年第S2期64-68,共5页 Journal on Communications
基金 国家自然科学基金资助项目(61370230)~~
关键词 模糊测试 静态分析 动态跟踪 漏洞挖掘 fuzz testing static analysis dynamic tracking vulnerabilities excavate
  • 相关文献

参考文献2

  • 1吴志勇,夏建军,孙乐昌,张旻.多维Fuzzing技术综述[J].计算机应用研究,2010,27(8):2810-2813. 被引量:12
  • 2Barton P. Miller,Louis Fredriksen,Bryan So.An empirical study of the reliability of UNIX utilities[J].Communications of the ACM.1990(12) 被引量:1

二级参考文献45

  • 1邵林,张小松,苏恩标.一种基于fuzzing技术的漏洞发掘新思路[J].计算机应用研究,2009,26(3):1086-1088. 被引量:17
  • 2KING J C.Symbolic execution and program testing[J].Journal of the ACM,1976,19(7):385-394. 被引量:1
  • 3YANG J,SAR C,TWOHEY P,et al.Automatically generating malicious disks using symbolic execution[C] //Proc of IEEE Symposium on Security and Privacy.Washington DC:IEEE Computer Society,2006:243-257. 被引量:1
  • 4ANAND S,GODEFROID P,TILLMANN N.Demand-driven compositional symbolic execution[C] //Proc of International Conference on Tools and Algorithms for the Construction and Analysis of Systems.2008:367-381. 被引量:1
  • 5LAROCHELLE D,EVANS D.Statically detecting likely buffer overflow vulnerabilities[C] //Proc of the 10th USENIX Security Symposium.Berkeley:USENIX Association,2001:177-190. 被引量:1
  • 6SUTTON M,GREENE A,AMINI P.Fuzzing:brute force vulnerability discovery[M].[S.l.] :Pearson Education Inc,2007:16. 被引量:1
  • 7LIPNER S,HOWARD M.The trustworthy computing security deve-lopment lifecycle[EB/OL].(2005-03).http://msdn.microsoft.com/security/default.aspx?pull=/library/en-us/dnsecure/html/sdl.asp. 被引量:1
  • 8MAXWELL S A.The bulletproof penguin[EB/OL].(2001-08-03).http://home.pacbell.net/s-max/scott/bulletproof-penguin.html. 被引量:1
  • 9GRIMES R.The buzz about fuzzers[EB/OL].(2005-11-28).http://www.infoworld.com/article/05/09/09/37OPsec advise_1.html. 被引量:1
  • 10MILLER B P,FREDRIKSON L,SO B.An empirical study of the reliablity of UNIX utilities[J].Communications of the ACM,1990,33(12):32-44. 被引量:1

共引文献11

同被引文献47

引证文献3

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部