Please use this identifier to cite or link to this item: https://www.um.edu.mt/library/oar/handle/123456789/99532
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGalea, John-
dc.contributor.authorVella, Mark Joseph-
dc.date.accessioned2022-07-19T06:43:37Z-
dc.date.available2022-07-19T06:43:37Z-
dc.date.issued2015-
dc.identifier.citationGalea, J, & Vella, M. (2015, August). Script fuzzing with an attacker’s mind-set. Trust and Trustworthy Computing: 8th International Conference (TRUST), Greece. 317–318.en_GB
dc.identifier.urihttps://www.um.edu.mt/library/oar/handle/123456789/99532-
dc.description.abstractAttackers primarily target memory corruption vulnerabilities inside script engine-hosting application, e.g. web browsers or most PDF viewers. Such applications are widely popular, and the discovery of vulnerabilities made by attackers ahead of security researchers diminishes the trustworthiness of their deployment. Typically, fuzzers are employed to generate unexpected inputs, with the aim of crashing applications and exposing errors. State-of-the-art fuzzers produce random byte sequences that comply with file/protocol formats. In the case of script fuzzers, random inputs need to constitute strings that are parse-able statements with respect to the scripting language used [1]. However, focusing solely on syntax-based randomness does not reflect the attacker’s mind-set, as generated inputs are not optimized for narrowing in on vulnerabilities. A demand exists for smarter fuzzers in order to accelerate the process of finding exploitable errors.en_GB
dc.language.isoenen_GB
dc.publisherSpringeren_GB
dc.rightsinfo:eu-repo/semantics/restrictedAccessen_GB
dc.subjectComputer networks -- Security measuresen_GB
dc.subjectComputer crimesen_GB
dc.subjectHackersen_GB
dc.subjectComputer networksen_GB
dc.titleScript fuzzing with an attacker’s mind-seten_GB
dc.typeconferenceObjecten_GB
dc.rights.holderThe copyright of this work belongs to the author(s)/publisher. The rights of this work are as defined by the appropriate Copyright Legislation or as modified by any successive legislation. Users may access this work and can make use of the information contained in accordance with the Copyright Legislation provided that the author must be properly acknowledged. Further distribution or reproduction in any format is prohibited without the prior permission of the copyright holder.en_GB
dc.bibliographicCitation.conferencenameTRUSTen_GB
dc.bibliographicCitation.conferenceplaceHeraklion, Greece, 24-26/08/2015en_GB
dc.description.reviewedpeer-revieweden_GB
dc.identifier.doi10.1007/978-3-319-22846-4-
Appears in Collections:Scholarly Works - FacICTCS

Files in This Item:
File Description SizeFormat 
Script_fuzzing_with_an_attacker’s_mind-set(2015).pdf
  Restricted Access
102.96 kBAdobe PDFView/Open Request a copy


Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.