2008 Third International Conference on Convergence and Hybrid Information Technology 2008
DOI: 10.1109/iccit.2008.9
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability Analysis for X86 Executables Using Genetic Algorithm and Fuzzing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…Song and his team have presented the BitBlaze method for the analysis of malicious software [39] . Liu and his colleagues have identified vulnerabilities in x86 programs using obfuscation methods and genetic algorithms [40] . Kroes and his team have provided automatic detection methods for memory management errors using Delta pointers [41] .…”
Section: Literature Reviewmentioning
confidence: 99%
“…Song and his team have presented the BitBlaze method for the analysis of malicious software [39] . Liu and his colleagues have identified vulnerabilities in x86 programs using obfuscation methods and genetic algorithms [40] . Kroes and his team have provided automatic detection methods for memory management errors using Delta pointers [41] .…”
Section: Literature Reviewmentioning
confidence: 99%
“…Dowser [19] and offset-aware fuzzing [39] use a combination of taint analysis and symbolic execution to generate overflow-inducing inputs. However, gray-box fuzzing techniques [25], [31], [38] require access to the runtime state of the target program making them unsuitable for embedded devices. DIFUZE [10] uses the interface information extracted using static analysis for fuzzing mobile kernel drivers.…”
Section: Related Workmentioning
confidence: 99%
“…Genetic Algorithms. The most frequently used ML technique for input generation is the genetic algorithm (GA) [13,14,17,28,30]. GAs, a type of unsupervised ML inspired by biological evolution, provide the core algorithms in evolutionary fuzzers.…”
Section: Input Generationmentioning
confidence: 99%