Detailed Information

Cited 0 time in webofscience Cited 1 time in scopus
Metadata Downloads

A study of vulnerability assessment using fuzzing data suite and data flow analysis in software

Full metadata record
DC Field Value Language
dc.contributor.author박재표-
dc.contributor.author전문석-
dc.contributor.authorSong, J.-H.-
dc.date.available2018-05-08T00:20:04Z-
dc.date.created2018-04-18-
dc.date.issued2016-09-
dc.identifier.issn1936-6612-
dc.identifier.urihttp://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/5734-
dc.description.abstractRecently, there are many studies about infringement protection such as analysis study of potential abuse of weak point and researches for weak point of software. This study provide with Exploitable assessment method based on the data flow analysis and software clash analysis for the exploit prediction. This method analyze the limitation of existing clash analysis and the characteristics of existing data flow analysis, and improve the traceability of access violation clash weak point based on the relativity of functional unit by analyzing unit area of clash analysis and data flow analysis. In order to achieve this, I extracted the fuzzing data format, mapped data format to the knot of Dependency structure matrices based data flow analysis, and conducted the examination if the reading access violation from functions connected to clash was related to the clash value. The proposed method adapted functional flow analysis of software to weak point analysis method to overcome the excessive exhaustion of resources in overall flow analysis of software, related the dynamic-based analysis result such as fuzzing and taint analysis, which finally is able to extract the base data for assessment Exploitable. © 2016 American Scientific Publishers. All rights reserved.-
dc.language영어-
dc.language.isoen-
dc.publisherAmerican Scientific Publishers-
dc.relation.isPartOfAdvanced Science Letters-
dc.titleA study of vulnerability assessment using fuzzing data suite and data flow analysis in software-
dc.typeArticle-
dc.identifier.doi10.1166/asl.2016.7809-
dc.type.rimsART-
dc.identifier.bibliographicCitationAdvanced Science Letters, v.22, no.9, pp.2592 - 2597-
dc.description.journalClass1-
dc.identifier.scopusid2-s2.0-85019980738-
dc.citation.endPage2597-
dc.citation.number9-
dc.citation.startPage2592-
dc.citation.titleAdvanced Science Letters-
dc.citation.volume22-
dc.contributor.affiliatedAuthor박재표-
dc.contributor.affiliatedAuthor전문석-
dc.type.docTypeArticle-
dc.description.isOpenAccessN-
dc.subject.keywordAuthorDependency structure matrices-
dc.subject.keywordAuthorExploitable assessment-
dc.subject.keywordAuthorSoftware crash analysis-
dc.subject.keywordAuthorTaint analysis-
dc.subject.keywordAuthorVulnerability-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Information Technology > School of Computer Science and Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher PARK, JAE PYO photo

PARK, JAE PYO
Graduate School (Graduate School of Information Sciences)
Read more

Altmetrics

Total Views & Downloads

BROWSE