PDF-Taint-basedDirectedWhiteboxFuzzingVijayGaneshandTimLeekandMartinRinard
Author : mitsue-stanley | Published Date : 2016-04-18
inputisidenticaltooneofthesampleinputsexceptthattheinputbytesthata ectthevaluesatoneormoreattackpointshavebeenalteredBydefaultourimplementedBuzzFuzzsystemsetsthesebytestoextremalvalueseglarge
Presentation Embed Code
Download Presentation
Download Presentation The PPT/PDF document "Taint-basedDirectedWhiteboxFuzzingVijayG..." is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Taint-basedDirectedWhiteboxFuzzingVijayGaneshandTimLeekandMartinRinard: Transcript
inputisidenticaltooneofthesampleinputsexceptthattheinputbytesthataectthevaluesatoneormoreattackpointshavebeenalteredBydefaultourimplementedBuzzFuzzsystemsetsthesebytestoextremalvalueseglarge. Paper by: James Newsome and Dawn Song. Network and Distributed Systems Security Symposium (NDSS), Feb 2005.. . CS451 Spring 2011. Instructor: Christos Papadopoulos. Original slides by . Devendra. . and farm characteristics associated with boar taint . and aggressive behaviour on . Dutch . pig farms. 2-12-2011, C. . van . Wagenberg, . B. van der . Fels, . C. van der . Peet-Schwering, . H. . Snoek, . Incorporating Synchronization Arcs in . Dataflow-Analysis-Based Parallel Monitoring. Michelle Goodstein. *. , Shimin Chen. †. , . Phillip B. Gibbons. ‡. , Michael A. Kozuch. ‡. . and Todd C. Mowry. A Checksum-Aware Directed fuzzing Tool for Automatic Software Vulnerability Detection. Tielei. Wang. 1. , Tao Wei. 1. , . Guofei. Gu. 2. , Wei Zou. 1. 1. Peking University, China. 2. Texas A&M University, US. About Dynamic . Taint . Analysis & Forward . Symbolic . Execution (. but might have been afraid to ask. ). Edward J. Schwartz, . ThanassisAvgerinos. , David . Brumley. Presented by: . Vaibhav . Rastogi. Data tainting and analysis. Roadmap. Background. TaintDroid. JavaScript. Conclusion. Background. In smartphone, we. . use third-party applications such as . - Google map, Angry bird … . etc. More than 10Billion Apps. Ron Rivest. Crypto in the Clouds Workshop, MIT Rump Session Talk. August 4, 2008. Taint . Common term in software security. Any external input is . tainted. . . A computation with a . tainted. input produces . BMSB potential impact in hazelnut and berry crops. Vaughn Walton*, Chris . Hedstrom. , . Nik. . Wiman. , Elizabeth . Tomasino. , . Pallavi. . Mohekar. , Betsey Miller, Danny Dalton, . Riki. York . concolic. execution. Suman Jana. *slides . are . adapted from . Adam . Kiezun. , Philip J. . Guo. , . Karthick. . Jayaraman. , . and Michael . D. Ernst. Automatic Creation of . SQL Injection and. Cross-Site Scripting . Yinzhi Cao. Reference: . http. ://www.cs.tau.ac.il/~. omertrip/pldi09/TAJ.ppt. www.cs.cmu.edu/~. soonhok/talks/20110301.pdf. 2. Motivating Example. *. * Inspired by . Refl1. in. SecuriBench Micro. Taint Flow #1. About Dynamic . Taint . Analysis & Forward . Symbolic . Execution (. but might have been afraid to ask. ). Edward J. Schwartz, . ThanassisAvgerinos. , David . Brumley. Presented by: . Vaibhav . Rastogi. Roadmap. Background. TaintDroid. JavaScript. Conclusion. Background. In smartphone, we. . use third-party applications such as . - Google map, Angry bird … . etc. More than 10Billion Apps. Because it’s useful.. Ron Rivest. Crypto in the Clouds Workshop, MIT Rump Session Talk. August 4, . 2009. Taint . Common term in software security. Any external input is . tainted. . . A computation with a . tainted. input produces . Realtime. Privacy. Monitoring On Smartphones. Authors:. William . Enck. The . Pennsylvania State . University . Peter Gilbert Duke University . Byung-Gon. Chun Intel Labs . Landon . P. . Cox Duke University .
Download Document
Here is the link to download the presentation.
"Taint-basedDirectedWhiteboxFuzzingVijayGaneshandTimLeekandMartinRinard"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.
Related Documents