Finding vulnerabilities in binary codes using tainting/fuzzing analysis
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hwang, S.O. | - |
dc.date.accessioned | 2021-12-02T04:44:58Z | - |
dc.date.available | 2021-12-02T04:44:58Z | - |
dc.date.created | 2021-11-30 | - |
dc.date.issued | 2012 | - |
dc.identifier.issn | 1865-0929 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/19072 | - |
dc.description.abstract | Recently, cyber attacks on clients and servers have rapidly increased. Most of these attacks have exploited the underlying vulnerabilities in the target software. Unfortunately, identifying and correcting these vulnerabilities has become extremely difficult and time consuming since (1) most security analyses are based on hard to understand binary representation of the software, (2) most binary codes are too large to be analyzed by a human being, and (3) most software updates or patches are done either regularly or frequently, each of which requires security analysis. Therefore, what we need is a more efficient approach to software security analysis. In response to this concern, experts are now examining tainting and fuzzing techniques as viable alternatives to improve software security. In this article, we present an efficient method for software security analysis using tainting and fuzzing techniques. © 2012 Springer-Verlag. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.title | Finding vulnerabilities in binary codes using tainting/fuzzing analysis | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Hwang, S.O. | - |
dc.identifier.doi | 10.1007/978-3-642-32692-9_36 | - |
dc.identifier.scopusid | 2-s2.0-84865962440 | - |
dc.identifier.bibliographicCitation | Communications in Computer and Information Science, v.310 CCIS, pp.277 - 286 | - |
dc.relation.isPartOf | Communications in Computer and Information Science | - |
dc.citation.title | Communications in Computer and Information Science | - |
dc.citation.volume | 310 CCIS | - |
dc.citation.startPage | 277 | - |
dc.citation.endPage | 286 | - |
dc.type.rims | ART | - |
dc.type.docType | Conference Paper | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordAuthor | fuzzing | - |
dc.subject.keywordAuthor | security | - |
dc.subject.keywordAuthor | tainting | - |
dc.subject.keywordAuthor | vulnerability | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
94, Wausan-ro, Mapo-gu, Seoul, 04066, Korea02-320-1314
COPYRIGHT 2020 HONGIK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.