Finding Vulnerabilities in Binary Codes Using Tainting/Fuzzing Analysis
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hwang, Seong Oun | - |
dc.date.accessioned | 2022-06-23T01:40:48Z | - |
dc.date.available | 2022-06-23T01:40:48Z | - |
dc.date.created | 2022-06-23 | - |
dc.date.issued | 2012 | - |
dc.identifier.issn | 1865-0929 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/29636 | - |
dc.description.abstract | Recently, cyber attacks on clients and servers have rapidly increased. Most of these attacks have exploited the underlying vulnerabilities in the target software. Unfortunately, identifying and correcting these vulnerabilities has become extremely difficult and time consuming since (1) most security analyses are based on hard to understand binary representation of the software, (2) most binary codes are too large to be analyzed by a human being, and (3) most software updates or patches are done either regularly or frequently, each of which requires security analysis. Therefore, what we need is a more efficient approach to software security analysis. In response to this concern, experts are now examining tainting and fuzzing techniques as viable alternatives to improve software security. In this article, we present an efficient method for software security analysis using tainting and fuzzing techniques. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | SPRINGER-VERLAG BERLIN | - |
dc.title | Finding Vulnerabilities in Binary Codes Using Tainting/Fuzzing Analysis | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Hwang, Seong Oun | - |
dc.identifier.wosid | 000312877600036 | - |
dc.identifier.bibliographicCitation | CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, v.310, pp.277 - 286 | - |
dc.relation.isPartOf | CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY | - |
dc.citation.title | CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY | - |
dc.citation.volume | 310 | - |
dc.citation.startPage | 277 | - |
dc.citation.endPage | 286 | - |
dc.type.rims | ART | - |
dc.type.docType | Proceedings Paper | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.subject.keywordAuthor | security | - |
dc.subject.keywordAuthor | vulnerability | - |
dc.subject.keywordAuthor | tainting | - |
dc.subject.keywordAuthor | fuzzing | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
94, Wausan-ro, Mapo-gu, Seoul, 04066, Korea02-320-1314
COPYRIGHT 2020 HONGIK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.