On the effectiveness of scheduling fuzz testing

Wei Jun Chen, Hsiao Rong Tyan, Shih-Kun Huang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

With the rapid development of software systems, exploiting software vulnerabilities to invade the system has largely increased. As a result, software security becomes vitally important. Since it is impossible to develop programs without bugs and it is inefficient to test program manually, we need a systematic software testing methods to verify if the software is with good quality. Black-box testing is a technique that can find bugs without the target program's source code, and normally copes with mutation fuzz testing. There are numerous fuzz testing tools freely available, but to find the maximum amount of unique bugs in limited interval of time is still a problem remained to be solved. In this paper we have used several scheduling algorithms to improve the fuzzer called FOE (Failure Observation Engine) to better improve the original fuzzing efficiency and produce maximum unique bugs in a given period of time.

Original languageEnglish
Title of host publicationIntelligent Systems and Applications - Proceedings of the International Computer Symposium, ICS 2014
EditorsWilliam Cheng-Chung Chu, Han-Chieh Chao, Stephen Jenn-Hwa Yang
PublisherIOS Press
Pages841-849
Number of pages9
ISBN (Electronic)9781614994831
DOIs
StatePublished - 2015
EventInternational Computer Symposium, ICS 2014 - Taichung, Taiwan
Duration: 12 Dec 201414 Dec 2014

Publication series

NameFrontiers in Artificial Intelligence and Applications
Volume274
ISSN (Print)0922-6389
ISSN (Electronic)1879-8314

Conference

ConferenceInternational Computer Symposium, ICS 2014
Country/TerritoryTaiwan
CityTaichung
Period12/12/1414/12/14

Keywords

  • Black-box testing
  • Computer Security
  • Fuzz testing
  • Software Security
  • Software testing

Fingerprint

Dive into the research topics of 'On the effectiveness of scheduling fuzz testing'. Together they form a unique fingerprint.

Cite this