期刊文献+

基于Fuzzing的军用报文软件漏洞发掘技术 被引量:1

Military Message Software Vulnerability Exploiting Technology Based on Fuzzing
下载PDF
导出
摘要 分析军用报文格式及其软件特点,给出一种智能强制性Fuzzing测试的畸形数据构造方法。根据Fuzzing技术的原理,设计军用报文软件漏洞发掘系统MTSFuzzer,并对其构架、模块以及关键技术进行描述。测试结果表明,MTSFuzzer能提高军用报文软件漏洞的发掘效率,并且具有较好的可扩展性。 In view of military message structure and characteristics of its software,an intelligent brute Fuzzing test approach for construction of abnormality data is proposed.According to the principles and ideas of Fuzzing,military message software security vulnerability discovery system named MTSFuzzer is developed.Meanwhile,software architecture,modules and key techniques are analyzed.Test result shows that MTSFuzzer improves the efficiency of military message software vulnerability exploiting,and it has good expansibility.
出处 《计算机工程》 CAS CSCD 2012年第18期61-64,共4页 Computer Engineering
基金 院校科研基金资助项目(2011XYJJ-073)
关键词 FUZZING技术 军用报文软件 漏洞发掘 系统构架 畸形数据 Fuzzing technique; military message software; vulnerability exploiting; system architecture; abnormality data
  • 相关文献

参考文献5

  • 1吴志勇,王红川,孙乐昌,潘祖烈,刘京菊.Fuzzing技术综述[J].计算机应用研究,2010,27(3):829-832. 被引量:30
  • 2邵林,张小松,苏恩标.一种基于fuzzing技术的漏洞发掘新思路[J].计算机应用研究,2009,26(3):1086-1088. 被引量:17
  • 3SPIKE Proxy[EB/OL]. (2009-06-15). http://www.immunitysec. com/resources-freesoftware.shtml.
  • 4Sutton M, Greene A, Amini P. 模糊测试-强制性安全漏洞发掘[M]. 李虎, 译. 北京: 机械工业出版社, 2009.
  • 5王继刚, 曲慧文. 软件漏洞发掘与安全防范实战[M]. 北京:人民邮电出版社, 2010.

二级参考文献49

  • 1邵林,张小松,苏恩标.一种基于fuzzing技术的漏洞发掘新思路[J].计算机应用研究,2009,26(3):1086-1088. 被引量:17
  • 2MILLER B P, FREDRIKSON L, SO B. An empirical study of the reliablity of UNIX utilities[ J]. Communications of the ACM, 1990, 33(2) :32.
  • 3AITEL D. The advantages of block-based protocol analysis for security testing[ R]. New York: Immunity Inc, 2002.
  • 4SPIKE [ EB/OL ]. ( 2009- 06 ). http ://www. immunitysec, com/resources-freesoftware, shtml.
  • 5GODEFROID P, LEVIN M, MOLNAR D. Active property checking [ C]//Proc of the 8th ACM International Conference on Embedeling Software. 2008 : 19-24.
  • 6GODEFROID P, LEVIN M, MOLNAR D. Automated whitebox fuzz testing[ C ]//Proc of Network Distributed Security Symposium. 2005.
  • 7MILLER B P, KOSKI D, LEE C P,et al. Fuzzing revisted: a reexamination of the reliability of UNIX utilities and services [ R]. Madison: University of Wisconsin Madison, 1995.
  • 8SUTTON M, GREENE A, AMINI P. Fuzzing: brute vulnerability discovery[ M]. [ S. l. ] : Pearson Education Inc, 2007 : 16.
  • 9ANDREA L, LORENZO M, MATTIA M,et al. A smart fuzzer for x86 executables[ C ]//Proc of the 3rd International Workshop on Software Engineering for Secure Systems. [ S. l. ] : IEEE Computer Society, 2007:7.
  • 10OEHLERT P. Violating assumption with fuzzing[ J]. IEEE Security and Privacy,2005,3(2) :58-62.

共引文献42

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部