메뉴 건너뛰기




Volumn , Issue , 2010, Pages 525-530

Configuration fuzzing for software vulnerability detection

Author keywords

Configuration fuzzing; Fuzz testing; In vivo testing; Security invariants; Vulnerability

Indexed keywords

FUZZ TESTING; IN-VIVO; INPUT SPACE; RUNNING APPLICATIONS; RUNTIME ENVIRONMENTS; SOFTWARE APPLICATIONS; SOFTWARE SECURITY; SOFTWARE VULNERABILITIES; TESTING METHODOLOGY; TESTING TECHNIQUE;

EID: 77952329885     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2010.22     Document Type: Conference Paper
Times cited : (23)

References (20)
  • 3
    • 77952398107 scopus 로고    scopus 로고
    • Fuzzing for software vulnerability discovery
    • Department of Mathematic, Royal Holloway, University of London
    • T. Clarke, "Fuzzing for software vulnerability discovery," Department of Mathematic, Royal Holloway, University of London, Tech. Rep. RHUL-MA-2009-4, 2009.
    • (2009) Tech. Rep. RHUL-MA-2009-4
    • Clarke, T.1
  • 5
    • 0036093547 scopus 로고    scopus 로고
    • Model-based analysis of configuration vulnerabilities
    • C. Ramakrishnan and R. Sekar, "Model-based analysis of configuration vulnerabilities," Journal of Computer Security, vol. 10, pp. 189-209, 2002.
    • (2002) Journal of Computer Security , vol.10 , pp. 189-209
    • Ramakrishnan, C.1    Sekar, R.2
  • 14
    • 77952373390 scopus 로고    scopus 로고
    • "Putty," http://www.chiark.greenend.org.uk/sgtatham/putty.
  • 15
    • 0031123369 scopus 로고    scopus 로고
    • Fault injection techniques and tools
    • M.-C. Hsueh, T. K. Tsai, and R. K. Iyer, "Fault injection techniques and tools," Computer, vol. 30, no. 4, pp. 75-82, 1997.
    • (1997) Computer , vol.30 , Issue.4 , pp. 75-82
    • Hsueh, M.-C.1    Tsai, T.K.2    Iyer, R.K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.