Letychevskyi et al., 2022 - Google Patents
Fuzz Testing Technique and its Use in Cybersecurity TasksLetychevskyi et al., 2022
- Document ID
- 13745778788749797612
- Author
- Letychevskyi O
- Peschanenko V
- Hryniuk Y
- Publication year
- Publication venue
- Cybernetics and Systems Analysis
External Links
Snippet
The paper considers the technology of fuzz testing, which is testing software systems by feeding critical or unexpected input data to them. An overview of the current problem state is made and the main systems of fuzz testing are presented. An approach to the fuzz testing …
- 238000000034 method 0 title description 16
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
- G06F9/455—Emulation; Software simulation, i.e. virtualisation or emulation of application or operating system execution engines
- G06F9/45504—Abstract machines for programme code execution, e.g. Java virtual machine [JVM], interpreters, emulators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/40—Transformations of program code
- G06F8/41—Compilation
- G06F8/44—Encoding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3604—Software analysis for verifying properties of programs
- G06F11/3612—Software analysis for verifying properties of programs by runtime analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
- G06F11/3672—Test management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3409—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3466—Performance evaluation by tracing or monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
- G06F17/5009—Computer-aided design using simulation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/362—Software debugging
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jin et al. | Symlm: Predicting function names in stripped binaries via context-sensitive execution-aware code embeddings | |
Kahsai et al. | JayHorn: A framework for verifying Java programs | |
Park et al. | Carfast: Achieving higher statement coverage faster | |
Brooks | Survey of automated vulnerability detection and exploit generation techniques in cyber reasoning systems | |
Hasabnis et al. | Lifting assembly to intermediate representation: A novel approach leveraging compilers | |
US20110138369A1 (en) | Feedback-Directed Call Graph Expansion | |
US10942718B2 (en) | Systems and/or methods for type inference from machine code | |
He et al. | Sofi: Reflection-augmented fuzzing for javascript engines | |
Liew et al. | Just fuzz it: solving floating-point constraints using coverage-guided fuzzing | |
Wu et al. | Evaluating and improving neural program-smoothing-based fuzzing | |
JP6904043B2 (en) | Input discovery for unknown program binaries | |
Sun et al. | {KSG}: Augmenting kernel fuzzing with system call specification generation | |
CN115017516A (en) | Fuzzy test method based on symbolic execution | |
CN112948828A (en) | Binary program malicious code detection method, terminal device and storage medium | |
Letychevskyi et al. | Fuzz Testing Technique and its Use in Cybersecurity Tasks | |
Stallenberg et al. | Guess what: Test case generation for Javascript with unsupervised probabilistic type inference | |
Ďurfina et al. | Design of a retargetable decompiler for a static platform-independent malware analysis | |
Huang et al. | Precise dynamic symbolic execution for nonuniform data access in smart contracts | |
Singh et al. | Parallel chopped symbolic execution | |
Letychevskyi | Two-level algebraic method for detection of vulnerabilities in binary code | |
Baradaran et al. | A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes | |
Romano et al. | Automated WebAssembly Function Purpose Identification With Semantics-Aware Analysis | |
Frohme et al. | Never-stop context-free learning | |
Borisov et al. | On the automatic analysis of the practical resistance of obfuscating transformations | |
JP2017041196A (en) | Stub object determination device, method, and program |