Testing program crash based on search based testing and exception injection

F Anwer, M Nazir, K Mustafa - … Conference, ISEA-ISAP 2018, Jaipur, India …, 2019 - Springer
Program crash has always been one of the serious issues, especially in modern
applications. It poses severe security concern to the applications and may pose a life …

Detection and diagnosis of control interception

CH Tsai, SK Huang - … Security: 9th International Conference, ICICS 2007 …, 2007 - Springer
Crash implies that a software is unstable and possibly vulnerable. Stack overflow is one of
many causes of crashes. This kind of bug is often hard to debug because of the corrupted …

[PDF][PDF] Generation of security test to find injection attacks by code review

N Parthiban, R Ravi, B Shekhar - 2014 - academia.edu
Security Testing is much important in Software Development to find the vulnerabilities while
developing the product. In this paper I presented a method to find the injection …

Search-based concolic execution for SW vulnerability discovery

R Fayozbek, M Choi, J Yun - IEICE TRANSACTIONS on …, 2018 - search.ieice.org
Huge amounts of software appear nowadays. The more the number of software increases,
the more increased software vulnerabilities are. Although some automatic methods have …

Review of the benefits of DAST (dynamic application security testing) versus SAST

M Sharma - International Journal of Management and Engineering …, 2021 - ijmer.org
DAST is a method for dynamic application security testing that is used to find flaws in web-
based applications by simulating attacks on the applications. This method of analysis aims …

Program crash analysis based on taint analysis

Z Puhan, W Jianxiong, W Xin… - 2014 Ninth International …, 2014 - ieeexplore.ieee.org
Software exception analysis can not only improve software stability before putting into
commercial, but also could optimize the priority of patch updates subsequently. We propose …

Detecting vulnerabilities in C programs using trace-based testing

D Zhang, D Liu, Y Lei, D Kung… - 2010 IEEE/IFIP …, 2010 - ieeexplore.ieee.org
Security testing has gained significant attention recently due to frequent attacks against
software systems. This paper presents a trace-based security testing approach. It reuses test …

Crash Analysis Mechanisms in Vulnerability Mining Research

TT Tan, BS Wang, Y Tang… - 2019 IEEE 4th International …, 2019 - ieeexplore.ieee.org
Vulnerability mining research plays an important role in the fields of network security, but
without exploit, a vulnerability which can trigger program crash will be considered useless …

Software crash analysis for automatic exploit generation on binary programs

SK Huang, MH Huang, PY Huang… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
This paper presents a new method, capable of automatically generating attacks on binary
programs from software crashes. We analyze software crashes with a symbolic failure model …

Enhancement of Accuracy of Exploitability Analysis Tools for Crashes

H Jeon, KJ Eom, SK Mok, ES Cho - KIISE Transactions on …, 2016 - koreascience.kr
To enhance the reliability of programs, developers use fuzzing tools in test processes to
identify vulnerabilities so that they can be fixed ahead of time. In this case, the developers …