Autor: |
ZHANG Hai-tao, CHEN Guang-xuan, WANG Bin-jun |
Předmět: |
|
Zdroj: |
Application Research of Computers / Jisuanji Yingyong Yanjiu; Dec2013, Vol. 30 Issue 12, p3804-3806, 3p |
Abstrakt: |
Considering the lack of evaluation methods aiming to evaluate the performance of many kinds of fuzzing strategies in the developing of fuzzing techniques at present, this paper proposed an evaluation framework, which showed the mapping between tainted data graph and syntax tree based tracer developed. According to the relation of mappings, it proposed an evaluation method to calculate the power and entropy values of a strategy and the optimal one would be chosen from strategy sets. Compared with the results on the current fuzzing platform, it proves the validity and effectiveness of method. The application of optimal strategy on the SUT will improve the capability of code coverage and vulnerability detection. [ABSTRACT FROM AUTHOR] |
Databáze: |
Complementary Index |
Externí odkaz: |
|