Loading [MathJax]/extensions/MathZoom.js
Vulnerability mining for network protocols based on fuzzing | IEEE Conference Publication | IEEE Xplore

Vulnerability mining for network protocols based on fuzzing


Abstract:

With the development of the network, internet security is becoming a hot research topic. The vulnerabilities existed in protocol implementations may be exploited by malic...Show More

Abstract:

With the development of the network, internet security is becoming a hot research topic. The vulnerabilities existed in protocol implementations may be exploited by malicious attackers and cause serious problems. So it is necessary to do research in the vulnerability mining of network protocol. This paper presents an efficient approach for detecting the flaws of network protocols based on fuzzing. A fuzzer is built by extending an intelligent tool-Sulley, aiming to test the FTP and modify its weaknesses which are unable to solve the loop structure. Then, we apply the way to three FTP servers. The results show that the approach can easily find vulnerabilities of protocol implementation.
Date of Conference: 15-17 November 2014
Date Added to IEEE Xplore: 15 January 2015
ISBN Information:
Conference Location: Shanghai, China

Contact IEEE to Subscribe

References

References is not available for this document.