Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Finding Vulnerabilities in Binary Codes Using Tainting/Fuzzing Analysis

Authors
Hwang, Seong Oun
Issue Date
2012
Publisher
SPRINGER-VERLAG BERLIN
Keywords
security; vulnerability; tainting; fuzzing
Citation
CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, v.310, pp.277 - 286
Journal Title
CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY
Volume
310
Start Page
277
End Page
286
URI
https://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/29636
ISSN
1865-0929
Abstract
Recently, cyber attacks on clients and servers have rapidly increased. Most of these attacks have exploited the underlying vulnerabilities in the target software. Unfortunately, identifying and correcting these vulnerabilities has become extremely difficult and time consuming since (1) most security analyses are based on hard to understand binary representation of the software, (2) most binary codes are too large to be analyzed by a human being, and (3) most software updates or patches are done either regularly or frequently, each of which requires security analysis. Therefore, what we need is a more efficient approach to software security analysis. In response to this concern, experts are now examining tainting and fuzzing techniques as viable alternatives to improve software security. In this article, we present an efficient method for software security analysis using tainting and fuzzing techniques.
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Science and Technology > Department of Computer and Information Communications Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE