Coverage-based greybox fuzzing has strong capabilities in discovering virtualization software vulnerabilities. Efficiency is one of the most important indicators while evaluating greybox fuzzing. However, the interference of virtual hardware state conditions on testcase evaluation severely impairs the efficiency of greybox fuzzing. In order to reduce the interference of virtual hardware state conditions and increase the efficiency of fuzzing, we propose a state-based virtual hardware fuzzing framework, named SAVHF (State-Aware Virtual Hardware Fuzzing). In this framework, a source-to-source instrumentation method based on the abstract syntax tree is proposed to detect the state condition of virtual hardware. Based on the source-to-source in...
Computer security aims at protecting confidentiality, in-tegrity, and availability of sensitive info...
Over the recent years, the software industry has faced a steady increase in the number of exposed an...
Malware is one of the biggest security threat today and deploying effective defensive solutions requ...
Virtualization has become an indispensable technique for scaling up the analysis of malicious code, ...
System administrators use application-level knowledge to identify anomalies in virtual appliances (V...
Part 2: Asian Conference on Availability, Reliability and Security (AsiaARES)International audienceI...
Virtual machines are often considered more secure than regular machines due to the abstraction from ...
As embedded devices are becoming more pervasive in our everyday lives, they turn into an attractive ...
Directed fuzzing focuses on automatically testing specific parts of the code by taking advantage of ...
With the growing prevalence of the Internet of Things (IoT), related security threats have kept pace...
Virtual machines offer the ability to partition the resources of a physical system and to create iso...
This deposit provides an Ubuntu Virtual Machine (VM) containing the implementation of the bug detect...
Computer systems are deeply integrated into our daily routines such as online shopping, checking ema...
Software security has been growing in importance due to the increasing reliance on various systems ...
Fuzz testing is an effective technique for finding software vulnerabilities. Fuzzing works by feedin...
Computer security aims at protecting confidentiality, in-tegrity, and availability of sensitive info...
Over the recent years, the software industry has faced a steady increase in the number of exposed an...
Malware is one of the biggest security threat today and deploying effective defensive solutions requ...
Virtualization has become an indispensable technique for scaling up the analysis of malicious code, ...
System administrators use application-level knowledge to identify anomalies in virtual appliances (V...
Part 2: Asian Conference on Availability, Reliability and Security (AsiaARES)International audienceI...
Virtual machines are often considered more secure than regular machines due to the abstraction from ...
As embedded devices are becoming more pervasive in our everyday lives, they turn into an attractive ...
Directed fuzzing focuses on automatically testing specific parts of the code by taking advantage of ...
With the growing prevalence of the Internet of Things (IoT), related security threats have kept pace...
Virtual machines offer the ability to partition the resources of a physical system and to create iso...
This deposit provides an Ubuntu Virtual Machine (VM) containing the implementation of the bug detect...
Computer systems are deeply integrated into our daily routines such as online shopping, checking ema...
Software security has been growing in importance due to the increasing reliance on various systems ...
Fuzz testing is an effective technique for finding software vulnerabilities. Fuzzing works by feedin...
Computer security aims at protecting confidentiality, in-tegrity, and availability of sensitive info...
Over the recent years, the software industry has faced a steady increase in the number of exposed an...
Malware is one of the biggest security threat today and deploying effective defensive solutions requ...