Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Finding vulnerabilities in binary codes using tainting/fuzzing analysis

Full metadata record
DC Field Value Language
dc.contributor.authorHwang, S.O.-
dc.date.accessioned2021-12-02T04:44:58Z-
dc.date.available2021-12-02T04:44:58Z-
dc.date.created2021-11-30-
dc.date.issued2012-
dc.identifier.issn1865-0929-
dc.identifier.urihttps://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/19072-
dc.description.abstractRecently, cyber attacks on clients and servers have rapidly increased. Most of these attacks have exploited the underlying vulnerabilities in the target software. Unfortunately, identifying and correcting these vulnerabilities has become extremely difficult and time consuming since (1) most security analyses are based on hard to understand binary representation of the software, (2) most binary codes are too large to be analyzed by a human being, and (3) most software updates or patches are done either regularly or frequently, each of which requires security analysis. Therefore, what we need is a more efficient approach to software security analysis. In response to this concern, experts are now examining tainting and fuzzing techniques as viable alternatives to improve software security. In this article, we present an efficient method for software security analysis using tainting and fuzzing techniques. © 2012 Springer-Verlag.-
dc.language영어-
dc.language.isoen-
dc.titleFinding vulnerabilities in binary codes using tainting/fuzzing analysis-
dc.typeArticle-
dc.contributor.affiliatedAuthorHwang, S.O.-
dc.identifier.doi10.1007/978-3-642-32692-9_36-
dc.identifier.scopusid2-s2.0-84865962440-
dc.identifier.bibliographicCitationCommunications in Computer and Information Science, v.310 CCIS, pp.277 - 286-
dc.relation.isPartOfCommunications in Computer and Information Science-
dc.citation.titleCommunications in Computer and Information Science-
dc.citation.volume310 CCIS-
dc.citation.startPage277-
dc.citation.endPage286-
dc.type.rimsART-
dc.type.docTypeConference Paper-
dc.description.journalClass1-
dc.description.journalRegisteredClassscopus-
dc.subject.keywordAuthorfuzzing-
dc.subject.keywordAuthorsecurity-
dc.subject.keywordAuthortainting-
dc.subject.keywordAuthorvulnerability-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Science and Technology > Department of Computer and Information Communications Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE