Fuzz testing data generation for network protocol using classification tree

Author(s):  
Rui Ma ◽  
Changzhen Hu ◽  
Chun Shan ◽  
Wu Peng ◽  
Wendong Ji
Author(s):  
Daniel Jeske ◽  
Pengyue Lin ◽  
Carlos Rendon ◽  
Rui Xiao ◽  
Behrokh Samadi

Author(s):  
Jianwei Sui ◽  
Yunzhan Gong ◽  
Dahai Jin ◽  
Yawen Wang

2011 ◽  
Vol 34 (2) ◽  
pp. 242-255 ◽  
Author(s):  
Wei-Ming LI ◽  
Ai-Fang ZHANG ◽  
Jian-Cai LIU ◽  
Zhi-Tang LI

2015 ◽  
Vol 75 (22) ◽  
pp. 14745-14757 ◽  
Author(s):  
Tewodros Legesse Munea ◽  
Hyunwoo Lim ◽  
Taeshik Shon

2014 ◽  
Vol 551 ◽  
pp. 642-647 ◽  
Author(s):  
Hua Zhang ◽  
Zhao Zhang ◽  
Wen Tang

Peach is an indispensable tool for network security experts, but, it is not perfect in the coarse controlling granularity. This paper analyzes the core code of Peach and makes improvements of Peach in three aspects: 1) applying different Mutators to test different fields in PDU; 2) starting a fuzz test at any test case according to a config.xml file; 3) executing the specified number of test cases in each test. These contributions make fuzz testing like software debugging, and locate a network protocol implementation's bug triggered by which test case more precisely with less time and less test cases than ever before. This paper also adds a replaying test scenario to Peach based on our contributions. Experimental results demonstrate that the features this paper improved to Peach could save lots of time with lower costs when applying Peach to test protocol implementations.


2017 ◽  
Vol 22 (5) ◽  
pp. 458-468
Author(s):  
Rui Ma ◽  
Shuaimin Ren ◽  
Ke Ma ◽  
Changzhen Hu ◽  
Jingfeng Xue

Sign in / Sign up

Export Citation Format

Share Document