Search: id:"swepub:oai:DiVA.org:kth-207388" >
OpenSAW :
OpenSAW : Open security analysis workbench
-
Ben Henda, N. (author)
-
Johansson, B. (author)
-
Lantz, P. (author)
-
show more...
-
Norrman, K. (author)
-
Saarinen, P. (author)
-
- Segersvärd, Oskar (author)
- KTH,Skolan för datavetenskap och kommunikation (CSC)
-
show less...
-
(creator_code:org_t)
- 2017-03-22
- 2017
- English.
-
In: 20th International Conference on Fundamental Approaches to Software Engineering, FASE 2017 Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017. - Berlin, Heidelberg : Springer Berlin/Heidelberg. - 9783662544938 ; , s. 321-337
- Related links:
-
https://urn.kb.se/re...
-
show more...
-
https://doi.org/10.1...
-
show less...
Abstract
Subject headings
Close
- Software is today often composed of many sourced componets, which potentially contain security vulnerabilities, and therefore require testing before being integrated. Tools for automated test case generation, for example, based on white-box fuzzing, are beneficial for this testing task. Such tools generally explore limitations of the specific underlying techniques for solving problems related to, for example, constraint solving, symbolic execution, search heuristics and execution trace extraction. In this article we describe the design of OpenSAW, a more flexible general-purpose white-box fuzzing framework intended to encourage research on new techniques identifying security problems. In addition, we have formalized two unaddressed technical aspects and devised new algorithms for these. The first relates to generalizing and combining different program exploration strategies, and the second relates to prioritizing execution traces. We have evaluated OpenSAW using both in-house and external programs and identified several bugs.
Subject headings
- NATURVETENSKAP -- Data- och informationsvetenskap -- Datavetenskap (hsv//swe)
- NATURAL SCIENCES -- Computer and Information Sciences -- Computer Sciences (hsv//eng)
Keyword
- Heuristic algorithms
- Software engineering
- Software testing
- Automated test case generation
- Constraint Solving
- Exploration strategies
- Security analysis
- Security problems
- Security vulnerabilities
- Symbolic execution
- Technical aspects
- Program debugging
Publication and Content Type
- ref (subject category)
- kon (subject category)
Find in a library
To the university's database