A Taint Based Approach for Smart Fuzzing. Bekrar, S., Bekrar, C., Groz, R., & Mounier, L. In ICST2012 - 5th International Conference on Software Testing, Verification and Validation, pages 818--825, Montreal, QC, Canada, 2012. IEEE Computer Society. 00029
Paper doi abstract bibtex Fuzzing is one of the most popular test-based software vulnerability detection techniques. It consists in running the target application with dedicated inputs in order to exhibit potential failures that could be exploited by a malicious user. In this paper we propose a global approach for fuzzing, addressing the main challenges to be faced in an industrial context: large-size applications, without source code access, and with a partial knowledge of the input specifications. This approach integrates several successive steps, and we mostly focus here on an important one which relies on binary-level dynamic taint analysis. We summarize the main problems to be addressed in this step, and we detail the solution we implemented to solve them.
@inproceedings{bekrar_taint_2012,
address = {Montreal, QC, Canada},
title = {A {Taint} {Based} {Approach} for {Smart} {Fuzzing}},
url = {https://hal.archives-ouvertes.fr/hal-00857281},
doi = {10.1109/ICST.2012.182},
abstract = {Fuzzing is one of the most popular test-based software vulnerability detection techniques. It consists in running the target application with dedicated inputs in order to exhibit potential failures that could be exploited by a malicious user. In this paper we propose a global approach for fuzzing, addressing the main challenges to be faced in an industrial context: large-size applications, without source code access, and with a partial knowledge of the input specifications. This approach integrates several successive steps, and we mostly focus here on an important one which relies on binary-level dynamic taint analysis. We summarize the main problems to be addressed in this step, and we detail the solution we implemented to solve them.},
urldate = {2016-05-23TZ},
booktitle = {{ICST}2012 - 5th {International} {Conference} on {Software} {Testing}, {Verification} and {Validation}},
publisher = {IEEE Computer Society},
author = {Bekrar, Sofia and Bekrar, Chaouki and Groz, Roland and Mounier, Laurent},
year = {2012},
note = {00029},
keywords = {dynamic analysis, smart fuzzing, taint analysis, vulnerability detection},
pages = {818--825}
}
Downloads: 0
{"_id":"aaSHRRpTQvh4bw9LA","bibbaseid":"bekrar-bekrar-groz-mounier-ataintbasedapproachforsmartfuzzing-2012","downloads":0,"creationDate":"2015-04-22T00:15:36.204Z","title":"A Taint Based Approach for Smart Fuzzing","author_short":["Bekrar, S.","Bekrar, C.","Groz, R.","Mounier, L."],"year":2012,"bibtype":"inproceedings","biburl":"https://api.zotero.org/users/2345845/collections/WG9KFXBW/items?key=9zfUPfSwh2adWPrQ5jSqh7vN&format=bibtex&limit=100i","bibdata":{"bibtype":"inproceedings","type":"inproceedings","address":"Montreal, QC, Canada","title":"A Taint Based Approach for Smart Fuzzing","url":"https://hal.archives-ouvertes.fr/hal-00857281","doi":"10.1109/ICST.2012.182","abstract":"Fuzzing is one of the most popular test-based software vulnerability detection techniques. It consists in running the target application with dedicated inputs in order to exhibit potential failures that could be exploited by a malicious user. In this paper we propose a global approach for fuzzing, addressing the main challenges to be faced in an industrial context: large-size applications, without source code access, and with a partial knowledge of the input specifications. This approach integrates several successive steps, and we mostly focus here on an important one which relies on binary-level dynamic taint analysis. We summarize the main problems to be addressed in this step, and we detail the solution we implemented to solve them.","urldate":"2016-05-23TZ","booktitle":"ICST2012 - 5th International Conference on Software Testing, Verification and Validation","publisher":"IEEE Computer Society","author":[{"propositions":[],"lastnames":["Bekrar"],"firstnames":["Sofia"],"suffixes":[]},{"propositions":[],"lastnames":["Bekrar"],"firstnames":["Chaouki"],"suffixes":[]},{"propositions":[],"lastnames":["Groz"],"firstnames":["Roland"],"suffixes":[]},{"propositions":[],"lastnames":["Mounier"],"firstnames":["Laurent"],"suffixes":[]}],"year":"2012","note":"00029","keywords":"dynamic analysis, smart fuzzing, taint analysis, vulnerability detection","pages":"818--825","bibtex":"@inproceedings{bekrar_taint_2012,\n\taddress = {Montreal, QC, Canada},\n\ttitle = {A {Taint} {Based} {Approach} for {Smart} {Fuzzing}},\n\turl = {https://hal.archives-ouvertes.fr/hal-00857281},\n\tdoi = {10.1109/ICST.2012.182},\n\tabstract = {Fuzzing is one of the most popular test-based software vulnerability detection techniques. It consists in running the target application with dedicated inputs in order to exhibit potential failures that could be exploited by a malicious user. In this paper we propose a global approach for fuzzing, addressing the main challenges to be faced in an industrial context: large-size applications, without source code access, and with a partial knowledge of the input specifications. This approach integrates several successive steps, and we mostly focus here on an important one which relies on binary-level dynamic taint analysis. We summarize the main problems to be addressed in this step, and we detail the solution we implemented to solve them.},\n\turldate = {2016-05-23TZ},\n\tbooktitle = {{ICST}2012 - 5th {International} {Conference} on {Software} {Testing}, {Verification} and {Validation}},\n\tpublisher = {IEEE Computer Society},\n\tauthor = {Bekrar, Sofia and Bekrar, Chaouki and Groz, Roland and Mounier, Laurent},\n\tyear = {2012},\n\tnote = {00029},\n\tkeywords = {dynamic analysis, smart fuzzing, taint analysis, vulnerability detection},\n\tpages = {818--825}\n}\n\n","author_short":["Bekrar, S.","Bekrar, C.","Groz, R.","Mounier, L."],"key":"bekrar_taint_2012","id":"bekrar_taint_2012","bibbaseid":"bekrar-bekrar-groz-mounier-ataintbasedapproachforsmartfuzzing-2012","role":"author","urls":{"Paper":"https://hal.archives-ouvertes.fr/hal-00857281"},"keyword":["dynamic analysis","smart fuzzing","taint analysis","vulnerability detection"],"downloads":0},"search_terms":["taint","based","approach","smart","fuzzing","bekrar","bekrar","groz","mounier"],"keywords":["dynamic analysis","smart fuzzing","taint analysis","vulnerability detection"],"authorIDs":[],"dataSources":["5wuvXcjZdiAp3GLdi"]}