Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Finding vulnerabilities in binary codes using tainting/fuzzing analysis

Authors
Hwang, S.O.
Issue Date
2012
Keywords
fuzzing; security; tainting; vulnerability
Citation
Communications in Computer and Information Science, v.310 CCIS, pp.277 - 286
Journal Title
Communications in Computer and Information Science
Volume
310 CCIS
Start Page
277
End Page
286
URI
https://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/19072
DOI
10.1007/978-3-642-32692-9_36
ISSN
1865-0929
Abstract
Recently, cyber attacks on clients and servers have rapidly increased. Most of these attacks have exploited the underlying vulnerabilities in the target software. Unfortunately, identifying and correcting these vulnerabilities has become extremely difficult and time consuming since (1) most security analyses are based on hard to understand binary representation of the software, (2) most binary codes are too large to be analyzed by a human being, and (3) most software updates or patches are done either regularly or frequently, each of which requires security analysis. Therefore, what we need is a more efficient approach to software security analysis. In response to this concern, experts are now examining tainting and fuzzing techniques as viable alternatives to improve software security. In this article, we present an efficient method for software security analysis using tainting and fuzzing techniques. © 2012 Springer-Verlag.
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Science and Technology > Department of Computer and Information Communications Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE