Fuzz Testing in Stack Based Buffer Overflow

dc.contributor.authorBhardwaj, Manisha
dc.contributor.supervisorBawa, Seema
dc.date.accessioned2017-07-25T05:37:41Z
dc.date.available2017-07-25T05:37:41Z
dc.date.issued2017-07-25
dc.descriptionMaster of Engineering -Software Engineeringen_US
dc.description.abstractDue to rapid deployment of information technology, the threats on information assets are getting more serious. These threats are originated from software vulnerabilities. The vulnerabilities bring about attacks. If attacks are launched before the public exposure of the targeted vulnerability, they are called zero-day attacks. These attacks damage system and economy seriously. One such attack is buffer overflow attack which are threat to the software system and application for decades. Since buffer overflow vulnerabilities are present in software so attackers can exploit thus obtains unauthorized access to system. As these unauthorized accesses are becoming more prevalent, so there is need for software testing to avoid zero-day attacks. One such testing is fuzz testing, locates vulnerabilities in software and find deeper bugs. The Stack based-American Fuzzy Lop( SAFAL) model has been proposed. This model works for software to exploit vulnerabilities. The model begins the process of fuzzing by applying various modifications to the input file. The binaries are compiled using the AFL wrappers. Input test case file is provided to the model to execute the test cases. The target program resulted in various crashes and hangs, that discovered stack buffer overflow vulnerabilities. The list of crashes, hangs, queues are found in output directory. The model displays real-time statistics of the fuzzing process. The SAFAL model improves the quality of software as the hidden bugs are found. The effectiveness and efficiency of SAFAL model is hence established.en_US
dc.description.sponsorshipDepartment of Computer Science and Engineering, Thapar University, Patialaen_US
dc.identifier.urihttp://hdl.handle.net/10266/4500
dc.language.isoenen_US
dc.subjectFuzz Testingen_US
dc.subjectAFLen_US
dc.subjectStacken_US
dc.subjectBuffer Overflowen_US
dc.subjectVulnerabilitiesen_US
dc.subjectExploitationen_US
dc.subjectFuzzersen_US
dc.titleFuzz Testing in Stack Based Buffer Overflowen_US
dc.typeThesisen_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
4500.pdf
Size:
2.71 MB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
2.03 KB
Format:
Item-specific license agreed upon to submission
Description: