期刊文献+

模糊测试技术研究综述 被引量:31

Survey of Fuzz Testing Technology
下载PDF
导出
摘要 软件中的安全漏洞可能导致非常严重的后果,因此漏洞挖掘已成为网络与信息安全领域的重大课题和研究热点。目前常用的漏洞挖掘技术包括静态分析、动态分析、二进制比对、模糊测试等。随着软件的规模和复杂度不断增大,模糊测试具有其它漏洞挖掘技术无法比拟的优势。首先介绍和分析了各种漏洞挖掘技术的优点和缺点;然后分别详细描述了模糊测试的研究进展、模糊测试的过程、测试用例的生成技术;最后介绍了模糊测试在各个领域的应用,并对其发展方向进行了展望。 Security vulnerabilities in software may lead to serious consequences,and vulnerability exploiting has become a hot area of research in network and information security.Popular vulnerability exploiting technologies include static analysis,dynamic analysis,binary code comparison,fuzz testing and so on.Along with the expansion of the scale and complexity of software,fuzz testing has incomparable advantages which other vulnerability exploiting technology can't provide.Firstly,both advantages and disadvantages of various vulnerability exploiting technology are discussed.Secondly,an account of the research advances of fuzz testing the procedure of fuzz testing and test case generation technology were described in detail.Finally,the applications of fuzz testing were shown and the trend of future study was discussed.
作者 张雄 李舟军
出处 《计算机科学》 CSCD 北大核心 2016年第5期1-8,26,共9页 Computer Science
基金 国家自然科学基金(61170189 61370126) 国家863计划(2015AA016004) 博士点基金(20111102130003)资助
关键词 软件安全 漏洞挖掘 模糊测试 测试用例生成 Software security Vulnerability exploiting Fuzz testing Test case generation
  • 相关文献

参考文献59

  • 1CNCERT.2013 China Internet Network Security Report [M].Beijing:Post & Telecom Press,2013(in Chinese).
  • 2Mei Hong,Wang Qian-xiang,Zhang Lu,et al.Analysis of the progress of software technology[J].Chinese Journal of Computers,2009,32(9):1697-1710(in Chinese).
  • 3ITS4[EB/OL].http://seclab.cs.ucdavis.edu/projects/testing/tools/its4.html.
  • 4FLAWFINDER[EB/OL].http://www.dwheeler.com/flawfinder.
  • 5IDA PRO[EB/OL].https://www.hex-rays.com/index.shtml.
  • 6Zhao Xiao-dong.Research and implementation of based malware analysis tool[D].Nanjing:Nanjing University,2012(in Chinese).
  • 7Vouk M A.Software reliability engineering∥A Tutorial Pre-sented at the Annual Reliability and Maintainability Symposium.2000.http://renoir.csc.ncsu.edu/Faculty/Vouk/vouk_se.html.
  • 8OllyDbg[EB/CP].http://www.ollydbg.de.
  • 9WinDbg[EB/CP].Whttp://www.windbg.org.
  • 10SoftICE[EB/OL].http://en.wikipedia.org/wiki/SoftICE.

二级参考文献64

  • 1Shaw M. Truth Vs. knowledge: The difference between what a component does and what we know it does//Proeeedings of the 8th International Workshop Software Specification and Design. Budapest, Hungary, 1996: 181- 185.
  • 2Binkley David. Source code analysis: A road map//Proceedings of the Future of Software Engineering. Minneapolis, MN, USA, 2007:104 -119.
  • 3Dwyer Matthew B, Hatcliff John, Robby, Pasareanu Corina S, Visser Willem. Formal software analysis emerging trends in software model cheeking//Proceedings of the Future of Software Engineering. Minneapolis, MN, USA, 2007: 120- 136.
  • 4Flemming Nielson, Hanne Riis Nielson, Chris Hankin. Principles of Program Analysis. Berlin, Germany: Springer Verlag, 2005.
  • 5Jackson Daniel, Rinard Martin. Software analysis: A roadmap//Proceedings of the Future of Software Engineering. Limerick, Ireland, 2000:133-145.
  • 6Aho Alfred V, Sethi Ravi, Ullman Jeffrey D. Compilers: Principles, Techniques, and Tools. New Jersey, USA: Addison-Wesley, 1986.
  • 7Clarke E M, Jr Grumberg O, Peled D A. Model Checking, Cambridge, MA: MIT Press, 2000.
  • 8Ball T, Rajamani S K. Automatically validating temporal safety properties of interfaces//Dwyer M B ed. Proceedings of the 8th SPIN Workshop. LNCS 2057. Springer, 2001:103-122.
  • 9Chen H, Wagner D A. MOPS: An infrastructure for examining security properties of software//Proceedings of the 9th ACM Conference on Computer and Communications Security. Washengton, DC, USA, 2002:235-244.
  • 10Corbett J et al. Bandera: Extracting finite-state models from Java source code//Proceedings of the 22nd ICSE. Limerick, Ireland, 2000:439-458.

共引文献100

同被引文献140

引证文献31

二级引证文献118

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部