Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Modeling the search for vulnerabilities via the fuzzing method using an automation representation of network protocols

Modeling the search for vulnerabilities via the fuzzing method using an automation representation... Currently, fuzzing is one of the most popular methods of revealing security problems of programs, information systems, network protocols, and web resources. A formal description of network protocols as a set of the processes of switching between states has been proposed, as well as an approach to fuzzing process modeling that allows one to detect network protocol vulnerabilities based on input data generation and the analysis of network protocol process states. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Automatic Control and Computer Sciences Springer Journals

Modeling the search for vulnerabilities via the fuzzing method using an automation representation of network protocols

Loading next page...
 
/lp/springer-journals/modeling-the-search-for-vulnerabilities-via-the-fuzzing-method-using-bye1G5bOJw

References (3)

Publisher
Springer Journals
Copyright
Copyright © 2015 by Allerton Press, Inc.
Subject
Computer Science; Control Structures and Microprogramming
ISSN
0146-4116
eISSN
1558-108X
DOI
10.3103/S0146411615080325
Publisher site
See Article on Publisher Site

Abstract

Currently, fuzzing is one of the most popular methods of revealing security problems of programs, information systems, network protocols, and web resources. A formal description of network protocols as a set of the processes of switching between states has been proposed, as well as an approach to fuzzing process modeling that allows one to detect network protocol vulnerabilities based on input data generation and the analysis of network protocol process states.

Journal

Automatic Control and Computer SciencesSpringer Journals

Published: Jan 28, 2016

There are no references for this article.