PPT-TaintScope : A Checksum-Aware Directed Fuzzing Tool for Automatic Software

Author : ellena-manuel | Published Date : 2018-11-04

Vulnerability Detection Tielei Wang1 2 Tao Wei1 2 Guofei Gu3 Wei Zou1 2 1Key Laboratory of Network and Software Security Assurance Peking University Ministry

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "TaintScope : A Checksum-Aware Directed F..." is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

TaintScope : A Checksum-Aware Directed Fuzzing Tool for Automatic Software: Transcript


Vulnerability Detection Tielei Wang1 2 Tao Wei1 2 Guofei Gu3 Wei Zou1 2 1Key Laboratory of Network and Software Security Assurance Peking University Ministry of Education Beijing 100871 China. Maxino Member IEEE and Philip J Koopman Senior Member IEEE Abstract Embedded control networks commonly use checksums to detect data transmission errors However design decisions about which checksum to use are difficult because of a lack of informat Fixity can be generated on the server side and there are also various types of programs available to assist with this task This paper provides basic information about checksums and describes the initial experience of five different easily accessible We call the tail of the head of and uv the ends of If there is an edge with tail and head then we let uv denote such an edge and we say that this edge is directed from to Loops Parallel Edges and Simple Digraphs An edge uv in a digraph is a The actual checksum math is easy and from a perfor mance standpoint so cheap that it can be con sidered free In the process of improving the use of hardware checksum of64258oading engines recalculating the IP checksum has been found to be essentialy Cows. The “No Bull” Talk on Fuzzing. Security B-Sides Ottawa. November 13, 2010. Mike Sues (Rigel Kent). Karim Nathoo (Inverse Labs). Objectives. We can’t cover fuzzing in-depth in 50 minutes. Raise awareness of fuzzing as an option in higher assurance/product evaluations/more focused assessments. Tielei. Wang. 1. , Tao Wei. 1. , . Guofei. Gu. 2. , Wei Zou. 1. 1. Peking University, China. 2. Texas A&M University, US. 31st IEEE Symposium on Security & Privacy. Outline. Introduction. Background . Tielei. Wang. 1. , Tao Wei. 1. , . Guofei. Gu. 2. , Wei Zou. 1. 1. Peking University, China. 2. Texas A&M University, US. 31st IEEE Symposium on Security & Privacy. Outline. Introduction. Background . Corey Kallenberg. Xeno Kovah. BIOS . Chronomancy. :. Fixing the Core Root of Trust for Measurement. Motivation. H. ow do trusted . computing BIOS security mechanisms . work?. What is actually measured to generate Trusted Platform Module (TPM)-stored BIOS measurements?. Dawn Song, . Kostya. . Serebryany. ,. Peter . Collingbourne. . Techniques for bug finding. Automatic test case generation. Lower coverage . Lower false positives . Higher false negatives. Fuzzing . Flexible . End-to-end Data Integrity. Yupu. Zhang. , Daniel . Myers, . Andrea . Arpaci-Dusseau. , . Remzi. . Arpaci-Dusseau. University of Wisconsin - Madison. 5/9/2013. 1. Data Corruption. Imperfect . Richard Johnson | Offensive Summit 2015. Introduction . Whoami. Richard Johnson / @richinseattle. Research Manager, Vulnerability Development. Cisco, Talos Security Intelligence and Research Group. Agenda. [SIGCOMM’16]. Muhammad Shahbaz. Nick . Feamster. Jennifer Rexford. Sean Choi. Nick McKeown. Ben Pfaff. Changhoon. Kim. Importance of Software Switches. Hypervisor. OVS. VM. VM. VM. VM. Hypervisor. Flexible . End-to-end Data Integrity. Yupu. Zhang. , Daniel . Myers, . Andrea . Arpaci-Dusseau. , . Remzi. . Arpaci-Dusseau. University of Wisconsin - Madison. 5/9/2013. 1. Data Corruption. Imperfect . Flexible . End-to-end Data Integrity. Yupu. Zhang. , Daniel . Myers, . Andrea . Arpaci-Dusseau. , . Remzi. . Arpaci-Dusseau. University of Wisconsin - Madison. 5/9/2013. 1. Data Corruption. Imperfect .

Download Document

Here is the link to download the presentation.
"TaintScope : A Checksum-Aware Directed Fuzzing Tool for Automatic Software"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Documents