期刊文献+

遗传算法在多维Fuzzing技术中的应用 被引量:2

Application of Genetic Algorithm on Multi-dimensional Fuzzing Technology
下载PDF
导出
摘要 对存在的多维Fuzzing技术中使用的遗传算法不能表示多种输入类型元素,不能充分使用已得到知识从而大大降低了基于知识的多维Fuzzing技术中提出的多维Fuzzing技术挖掘的漏洞的范围和能力,设计了一个包含选择、交叉、变异、修补等操作的可以表示大多数输入元素类型的遗传算法,提出一种多个输入元素的小染色体级连成一个大染色体,大染色体的遗传算子操作分解到各个小染色体之间操作的编码及操作方案,针对字符串型输入元素,提出一套可变长染色体的实值编码及操作方法.漏洞挖掘实验结果显示应用论文设计的遗传算法的多维Fuzzing技术具有更好的漏洞挖掘能力和更好的漏洞挖掘效率. The genetic algorithm in existing multi-dimensional Fuzzing technologies can not represent most types of input elements and can not use got knowledge thoroughly,which limit its discovered vulnerability′s scope and vulnerability mining ability,and this paper designs a genetic algorithm including select,crossover,mutate and mend operations and which can represent most input elements′ type,proposes an encoding and operation scheme where several input elements′ small chromosomes cascades a big chromosome and the operations on big chromosomes are divided into the operations on the small chromosomes,and proposes a suite of encoding and operations on variable-length chromosomes of input elements of string type.Experiment results on vulnerability mining show that the multi-dimensional Fuzzing technology which uses the proposed genetic algorithms works better than other multi-dimensional vulnerability mining ability both on the ability of vulnerability mining and the efficiency of vulnerability mining.
出处 《小型微型计算机系统》 CSCD 北大核心 2011年第5期998-1004,共7页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(60972161)资助 解放军电子工程学院博士生创新基金(CX2007016)资助
关键词 多维Fuzzing技术 遗传算法 演化测试 漏洞挖掘 multi-dimension fuzzing technology genetic algorithm evolutionary testing vulnerability mining
  • 相关文献

参考文献28

  • 1Sutton M, Greene A, Amini P, et al. Fuzzing: brute vulnerability discovery[M]. 1st ed. Pearson Education, Inc, 2007. 被引量:1
  • 2Miller B P, Fredrikson L, So B. An empirical study of the reliabli- ty of UNIX utilities[C]. In Comm. of the ACM, 1990,33(12) : 32. 被引量:1
  • 3Godefroid P, Levin M, Molnar D. Active property checking[ C] . In EMSOFT'08, 2008,19-24. 被引量:1
  • 4Godefroid P, Levin M, Molnar D. Automated whitebox fuzz tes- ting[C]. In NDSS, 2008. 被引量:1
  • 5Andrea L, Lorenzo M, Mattia M, et al. A smart fuzzer for x86 ex- ecutablesE C]. In Proceedings of the Third International Workshop on Software Engineering for Secure Systems : IEEE Computer Soci- ety, 2007. 被引量:1
  • 6Peach [ CP/OL ]. http ://www. peachFuzzer.com. http ://peach- fuzz. sourceforge. net. http ://peachfuzz@ googlegroups, comVis- ited on June, 2009. 被引量:1
  • 7Sulley [ CP/OL]. http://www. fuzzing. org. Visited on June, 2009. 被引量:1
  • 8Wu Zhi-yong, William Atwood J, Zhu Xue-yong. A new fuzzing technique for software vulnerability mining [ C ]. In IEEE CON- SEG'09, 17-19 December 2009, Chennai, India,59-66. 被引量:1
  • 9Vijay Ganesh, Tim Leek, Marlin Rinard. Taint-based directed whitebox fuzzing[ C]. In IEEE ICSE'09, May 16-24, 2009, Van- couver, Canada. 978-1-4244-3452-7/09. 被引量:1
  • 10Bern& D, Fisher J, Johnson L, et al. Breeding software test cases with genetic algorithms[ C]. In: Proceedings of the Hawai Inter- national Conference on System Sciences, 2003,338-48. 被引量:1

同被引文献24

引证文献2

二级引证文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部