Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yeh, Chao-Chun | en_US |
dc.contributor.author | Chung, Hsiang | en_US |
dc.contributor.author | Huang, Shih-Kun | en_US |
dc.date.accessioned | 2017-04-21T06:48:14Z | - |
dc.date.available | 2017-04-21T06:48:14Z | - |
dc.date.issued | 2015 | en_US |
dc.identifier.isbn | 978-1-4673-6563-5 | en_US |
dc.identifier.issn | 0730-3157 | en_US |
dc.identifier.uri | http://dx.doi.org/10.1109/COMPSAC.2015.99 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/136477 | - |
dc.description.abstract | Vulnerabilities are caused by implementation bugs, such as buffer overflow, integer overflow, uncontrolled format strings, and command injection flaws. They are often exploited to intrude software systems. In order to reduce software bugs, testing techniques are proposed. The recent technique to discover security-related bugs is fuzz testing. However, traditional fuzzers can only find bugs when program exceptions, especially crashes, raised. Some security threats may pass these tests due to insufficient code coverage. In this paper, we introduce a software testing framework based on symbolic execution using (SE)-E-2, a whole system symbolic execution engine. When a program executes our pre-defined security sensitive functions, such as malloc, strcpy or printf, our framework will initiate a triage process. The process will determine whether any related security vulnerabilities would possibly occur in these functions automatically. We successfully and efficiently reproduce 12 previously known vulnerabilities from normal input data within 100 seconds for large applications such as Tiff, VIM, and MPlayer. Our tool can help developers locate bugs faster, and improve the efficiency of software quality maintenance. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | component | en_US |
dc.subject | fuzz testing | en_US |
dc.subject | symbolic execution | en_US |
dc.subject | software testing | en_US |
dc.subject | vulnerability | en_US |
dc.title | CRAXfuzz: Target-Aware Symbolic Fuzz Testing | en_US |
dc.type | Proceedings Paper | en_US |
dc.identifier.doi | 10.1109/COMPSAC.2015.99 | en_US |
dc.identifier.journal | 39TH ANNUAL IEEE COMPUTERS, SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2015), VOL 2 | en_US |
dc.citation.spage | 460 | en_US |
dc.citation.epage | 471 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | 資訊技術服務中心 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.contributor.department | Information Technology Services Center | en_US |
dc.identifier.wosnumber | WOS:000380584300065 | en_US |
dc.citation.woscount | 0 | en_US |
Appears in Collections: | Conferences Paper |