Fuzzing and Vulnerabilities Search

Article English OPEN
Stanislav Evgenyevich Kirillov; Nikolai Petrovich Lavrentiev;
(2013)
  • Publisher: Moscow Engineering Physics Institute
  • Journal: Bezopasnostʹ Informacionnyh Tehnologij (issn: 2074-7128, eissn: 2074-7136)
  • Publisher copyright policies & self-archiving
  • Subject: Information technology | T58.5-58.64 | Q350-390 | Information theory | vulnerabilities search | data format reverse engineering
    acm: TheoryofComputation_LOGICSANDMEANINGSOFPROGRAMS

Fuzzing for vulnerabilities can be very effective if we know the input data format. This work contains description of network message format recovery algorithm and the usage of restored data model in fuzzing and vulnerabilities search.
Share - Bookmark