Abstract
Currently, fuzzing is one of the most popular methods of revealing security problems of programs, information systems, network protocols, and web resources. A formal description of network protocols as a set of the processes of switching between states has been proposed, as well as an approach to fuzzing process modeling that allows one to detect network protocol vulnerabilities based on input data generation and the analysis of network protocol process states.
Similar content being viewed by others
References
http://www.beyondsecurity.com/bestorm_fuzzing_QA_buffer_overflow.html. Cited May 20, 2013.
Gorbunov, S. and Rosenbloom, A., Autofuzz: Automated Network Protocol Fuzzing Framework, Mississauga, Ontario: University of Toronto Mississauga.
Makarov, A.N., Method for automated search of program errors in algorithms for processing of complexly structured data, Prikl. Diskretn. Mat., 2009, no. 3.
Tsipenyuk, K., Chess, B., and McGraw, G., Seven pernicious kingdoms: A taxonomy of software security errors, IEEE Secur. Priv., 2005, vol. 3, no. 6, pp. 81–84.
Pothamsetty, V. and Akyol, B.A., A vulnerability taxonomy for network protocols: Corresponding engineering best practice countermeasures, in Communications, Internet, and Information Technology, IASTED/ACTA Press, 2004, pp. 168–175.
Whalen, S., Bishop, M., and Engle, S., Protocol Vulnerability Analysis, 2005.
http://ru.wikipedia.org/wiki/%D0%9F%D0%B5%D1%80%D0%B5%D0%BF%D0%BE%D0%BB%D0%BD% D0%B5%D0%BD%D0%B8%D0%B5_%D0%B1%D1%83%D1%84%D0%B5%D1%80%D0%B0. Cited May 20, 2013.
http://peachfuzzer.com/. Cited May 20, 2013.
http://hotfuzz.sourceforge.net/. Cited May 20, 2013.
Author information
Authors and Affiliations
Corresponding author
Additional information
Original Russian Text © A.I. Pechenkin, D.S. Lavrova, 2015, published in Problemy Informatsionnoi Bezopasnosti. Komp’yuternye Sistemy.
About this article
Cite this article
Pechenkin, A.I., Lavrova, D.S. Modeling the search for vulnerabilities via the fuzzing method using an automation representation of network protocols. Aut. Control Comp. Sci. 49, 826–833 (2015). https://doi.org/10.3103/S0146411615080325
Received:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411615080325