3.8 Proceedings Paper

Online Model-Based Behavioral Fuzzing

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/ICSTW.2013.61

Keywords

Model-based Testing; Security Testing; Test Generation; Test Execution; Behavioral Fuzzing

Funding

  1. ITEA-2
  2. European Union's Seventh Framework Programme [FP7/2007-2013, 316853]

Ask authors/readers for more resources

Fuzz testing or fuzzing is interface robustness testing by stressing the interface of a system under test (SUT) with invalid input data. It aims at finding security-relevant weaknesses in the implementation that may result in a crash of the system-under-test or anomalous behavior. Fuzzing means sending invalid input data to the SUT, the input space is usually huge. This is also true for behavioral fuzzing where invalid message sequences are submitted to the SUT. Because systems are getting more and more complex, testing a single invalid message sequence becomes more and more time consuming due to startup and initialization of the SUT. We present an approach to make the test execution for behavioral fuzz testing more efficient by generating test cases at runtime instead of before execution, focusing on interesting regions of a message sequence based on a previously conducted risk analysis and reducing the test space by integrating already retrieved test results in the test generation process.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

3.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available