Computer Science ›› 2014, Vol. 41 ›› Issue (2): 7-10.

Previous Articles     Next Articles

Survey of Automated Whitebox Fuzz Testing

ZHANG Ya-jun,LI Zhou-jun,LIAO Xiang-ke,JIANG Rui-cheng and LI Hai-feng   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Software security analysis and vulnerability testing are one of the researching focus and difficulty in the software engineering.People think highly of the software security testing using program analysis.This paper began with an overview of the concepts of the software security testing,then detailed the popular methods of program analysis in softwared security testing:fuzz testing,symbolic execution and automated whitebox fuzz test and compared them to each other,finally gave an overview of the automated whitebox fuzz testing distributed system.

Key words: Fuzz testing,Symbolic execution,Automated whitebox fuzz test,Automated whitebox fuzz testing distributed system

[1] The economic impacts of inadequate infrastructure for software testing[R].National Institute of Standards and Technology,Planning Report 02-3.May 2002
[2] Takanen A,DeMott J,Miller C.Fuzzing for Softwair SecurityTesting and Quality Assurance[M].USA:Aatech House Inc.,2008:22-32
[3] Duran J,Ntafos S.An Evaluation of Random Testing[J].IEEETransactions on Software Engineering,1984,SE-10(4):438-444
[4] Peach.http://peachfuzzer.com/
[5] King J C.Symbolic Execution and Program Testing[J].Journalof the ACM,1976,19(7):385-394
[6] Boyer R S,Elspas B,Levitt K N.SELECT-A formal system for testing and debugging programs by symbolic execution[C]∥Proc.1975Int.Conf.Reliable Software.IEEE Computer Society,Long Beach,CA,1975:234-245
[7] Howedn W E.Symbolic Testing and the DISSECT Symbolic Evaluation Systerm[J].IEEE Transactions on Software Engineering,1977,7(4):266-278
[8] Howedn W E.DISSECT-A Symbolic Evaluation and ProgramTesting System[J].IEEE Transactions on Software Enginee-ring,1978,1(4):70-73
[9] Cadar C,Dunbar D,Engler D.KLEE:Unassisted and automatic generation of high-coverage tests for complex systems programs[C]∥OSDI’08.Dec.2008
[10] Cadar C,Ganesh V,Pawlowski P,et al.EXE:Automaticallygenerating inputs of death[C]∥Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 2006).2006
[11] Bush W R,Pincus J D,Sielaff D J.A static analyzer for finding dynamic programming errors[J].Software-Practice and Experience,2000,30(7):775-802
[12] Wang T,Wei T,Zou W.IntScope:Automatically Detecting Integer Overflow Vulnerability in X86Binary Using Symbolic Execution [C]∥Network and Distributed System Security Symposium.USA:Internet Society,2009
[13] Godefroid P,Levin M,Molnar D.Automated whitebox fuzz testing[C]∥NDSS.2008
[14] Hamadi Y.Disolver:A Distributed Constraint Solver[R].Technical Report MSR-TR-2003-91.Microsoft Research,December 2003
[15] Ganesh V,Dill D.A Decision Procedure for Bit-vectors and Arrays [M].Computer Aided Verification.Berlin:Springer-verlag,2007:524-536
[16] Moura L,Bjorer N.Z3:An Efficient SMT solver.Tools and Algorithms for the Construction and Analysis of Systems[M].Berlin:Springer-Verlag,2008:337-340
[17] Godefroid P,Klarlund N,Sen K.DART:Directed AutomatedRandom Testing[C]∥Proceedings of PLDI'2005(ACM SIGPLAN 2005Conference on Programming Language Design and Implementation).Chicago,June 2005:213-223
[18] Sen K,Marinov D,Agha G.CUTE:A Concolic Unit Testing Engine for C[C]∥European Software Engineering Conference and ACM Symposium on the Foundations of Software Engineering.USA:ACM Press,2005:263-272
[19] Godefroid P.Compositional Dynamic Test Generation[C]∥Proceedings of POPL’2007(34th ACM Symposium on Principles of Programming Languages). Nice,January 2007:47-54
[20] Molnar D,Wagner D.Catchconv:Symbolic Execution and Run-time Type Inference for Integer Conversion Errors[R].USA:Unversity of California Berkeley,2007
[21] Fuzzgrind.http://esec-lab.sogeti.com/pages/Fuzzgrind

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!