|
This article is cited in 1 scientific paper (total in 1 paper)
Features of fuzzing network interfaces without source codes
I. V. Sharkova, V. A. Padaryanba, P. V. Khenkinc a Ivannikov Institute for System Programming of the Russian Academy of Sciences
b Lomonosov Moscow State University
c PJSC Sberbank
Abstract:
The digital transformation of society is leading to the creation of a large number of distributed automated information systems in various areas of modern life. The need to meet security and reliability requirements prompts the creation of tools for their automated testing. Fuzzing within the security development lifecycle (SDL) is a strictly required tool for solving this problem. Tools for fuzzing binary-only applications are in demand too. These kind of fuzzing tools provide the search for critical defects in already functioning systems. It is especially acute when researching the security of proprietary systems operating using closed protocols. In the course of the research, it was found out that for fuzzing network applications in the absence of source codes, the use of universal fuzzers is complicated by many factors. These circumstances are pushing for the creation of an easy-to-use tool for network applications fuzzing. The paper discusses the features of fuzzing of this kind of programs and suggests possible solutions to the identified tasks.
Keywords:
fuzzing, testing, network applications, protocol specification, DynamoRIO, protocol state machine.
Citation:
I. V. Sharkov, V. A. Padaryan, P. V. Khenkin, “Features of fuzzing network interfaces without source codes”, Proceedings of ISP RAS, 33:4 (2021), 211–226
Linking options:
https://www.mathnet.ru/eng/tisp623 https://www.mathnet.ru/eng/tisp/v33/i4/p211
|
Statistics & downloads: |
Abstract page: | 36 | Full-text PDF : | 11 |
|