publication . Article . 2013

Fuzzing and Vulnerabilities Search

Stanislav Evgenyevich Kirillov; Nikolai Petrovich Lavrentiev;
Open Access English
  • Published: 01 Feb 2013 Journal: Bezopasnostʹ Informacionnyh Tehnologij (issn: 2074-7128, eissn: 2074-7136, Copyright policy)
  • Publisher: Moscow Engineering Physics Institute
Fuzzing for vulnerabilities can be very effective if we know the input data format. This work contains description of network message format recovery algorithm and the usage of restored data model in fuzzing and vulnerabilities search.
ACM Computing Classification System: TheoryofComputation_LOGICSANDMEANINGSOFPROGRAMS
free text keywords: vulnerabilities search, data format reverse engineering, Information technology, T58.5-58.64, Information theory, Q350-390
Any information missing or wrong?Report an Issue