期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
ADFEmu:Enhancing Firmware Fuzzing with Direct Memory Access(DMA)Input Emulation Using Concolic Execution and Large Language Models(LLMs)
1
作者 Yixin Ding Xinjian Zhao +3 位作者 Zicheng Wu Yichen Zhu Longkun Bai Hao Han 《Computers, Materials & Continua》 2025年第9期5977-5993,共17页
Fuzz testing is a widely adopted technique for uncovering bugs and security vulnerabilities in embedded firmware.However,many embedded systems heavily rely on peripherals,rendering conventional fuzzing techniques inef... Fuzz testing is a widely adopted technique for uncovering bugs and security vulnerabilities in embedded firmware.However,many embedded systems heavily rely on peripherals,rendering conventional fuzzing techniques ineffective.When peripheral responses are missing or incorrect,fuzzing a firmware may crash or exit prematurely,significantly limiting code coverage.While prior re-hosting approaches have made progress in simulating Memory-Mapped Input/Output(MMIO)and interrupt-based peripherals,they either ignore Direct Memory Access(DMA)or handle it oversimplified.In this work,we present ADFEmu,a novel automated firmware re-hosting framework that enables effective fuzzing of DMA-enabled firmware.ADFEmu integrates concolic execution with large language models(LLMs)to semantically emulate DMA operations and synthesize peripheral input sequences intelligently.Specifically,it learns DMA transfer patterns from the firmware’s context and employs guided symbolic execution to explore deeper and more diverse execution paths.This approach allows firmware to operate stably without hardware dependencies while achieving higher fidelity in emulation.Evaluated on real-world embedded firmware samples,ADFEmu achieves a 100%re-hosting success rate,improves total execution path exploration by 5.31%,and triggers more crashes compared to the state-of-the-art.These results highlight ADFEmu’s effectiveness in overcoming long-standing limitations of DMA emulation and its potential to advance automated vulnerability discovery in peripheral-rich embedded environments. 展开更多
关键词 Fuzz testing firmware rehosting DMA concolic execution LLMs
在线阅读 下载PDF
基于并行Java程序动态切片的Concolic测试 被引量:3
2
作者 濮方琍 卢炎生 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2009年第10期21-24,共4页
为了减少分析和存储信息,提高测试效率,针对Concolic测试中存在同一同步串运行多次的现象及测试效率不高的问题,提出了基于并行Java程序动态切片的Concolic测试方法.该方法运用并行程序动态切片确定测试同步串,无需分析和存储同步串每... 为了减少分析和存储信息,提高测试效率,针对Concolic测试中存在同一同步串运行多次的现象及测试效率不高的问题,提出了基于并行Java程序动态切片的Concolic测试方法.该方法运用并行程序动态切片确定测试同步串,无需分析和存储同步串每个执行点的信息,并保证不运行相同的同步串.实验证明,基于并行Java程序动态切片的Concolic测试方法极大地提高了Concolic测试的性能和效率,具有较高的实际可操作性. 展开更多
关键词 并行Java程序 动态切片 concolic测试 并行测试 软件测试
原文传递
面向源代码的导向Concolic测试方法研究 被引量:1
3
作者 常超 刘克胜 赵军 《计算机应用研究》 CSCD 北大核心 2018年第1期140-144,共5页
对规模较大的程序进行安全测试过程中,Concolic测试常面临路径爆炸和求解能力不足等问题。为缓解此类问题,提出一种面向源代码的导向Concolic测试方法。针对容易产生缺陷的危险代码区域,依据控制流和数据流属性,采用回溯的方式推导出静... 对规模较大的程序进行安全测试过程中,Concolic测试常面临路径爆炸和求解能力不足等问题。为缓解此类问题,提出一种面向源代码的导向Concolic测试方法。针对容易产生缺陷的危险代码区域,依据控制流和数据流属性,采用回溯的方式推导出静态可达路径信息和必要的符号变量,实现仅针对危险代码区域的覆盖测试。实证研究结果表明,通过规避对不关心路径和符号变量的分析,所提方法显著提升了覆盖测试危险代码区域的效率和发现缺陷的概率。 展开更多
关键词 concolic测试 缺陷检测 符号执行 代码插桩 约束求解
在线阅读 下载PDF
Software Backdoor Analysis Based on Sensitive Flow Tracking and Concolic Execution 被引量:3
4
作者 XU Xin WANG Jiajie +2 位作者 CHENG Shaoyin ZHANG Tao JIANG Fan 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第5期421-427,共7页
In order to effectively detect and analyze the backdoors this paper introduces a method named Backdoor Analysis based on Sensitive flow tracking and Concolic Execution(BASEC).BASEC uses sensitive flow tracking to ef... In order to effectively detect and analyze the backdoors this paper introduces a method named Backdoor Analysis based on Sensitive flow tracking and Concolic Execution(BASEC).BASEC uses sensitive flow tracking to effectively discover backdoor behaviors, such as stealing secret information and injecting evil data into system, with less false negatives. With concolic execution on predetermined path, the backdoor trigger condition can be extracted and analyzed to achieve high accuracy. BASEC has been implemented and experimented on several software backdoor samples widespread on the Internet, and over 90% of them can be detected. Compared with behavior-based and system-call-based detection methods, BASEC relies less on the historical sample collections, and is more effective in detecting software backdoors, especially those injected into software by modifying and recompiling source codes. 展开更多
关键词 software backdoor detection data flow tracking concolic execution malware detection
原文传递
基于Concolic Testing的动态Web页面测试研究
5
作者 张蕊 刘振宇 《计算机时代》 2010年第1期11-13,共3页
传统的软件测试技术对于动态Web程序并不完全适用,针对动态Web程序的特性,探讨适合的测试方法十分必要。文章分析了动态Web应用的特点与测试现状,简要介绍了Concolic Testing思想,并把Concolic Testing测试技术应用于Web应用动态内容页... 传统的软件测试技术对于动态Web程序并不完全适用,针对动态Web程序的特性,探讨适合的测试方法十分必要。文章分析了动态Web应用的特点与测试现状,简要介绍了Concolic Testing思想,并把Concolic Testing测试技术应用于Web应用动态内容页的测试,给出了具体的、具有针对性的测试算法,并以实例进行了验证。 展开更多
关键词 动态WEB应用 测试技术 concolic TESTING 执行路径
在线阅读 下载PDF
基于补丁比对的Concolic测试方法 被引量:4
6
作者 王欣 郭涛 +2 位作者 董国伟 邵帅 辛伟 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2013年第12期1737-1742,共6页
该文提出了一种基于二进制补丁比对的Concolic测试方法,用于对软件进行漏洞分析。该方法将补丁比对技术与Concolic测试方法进行了结合,首先通过补丁比对收集存在漏洞Sink点的程序路径,然后利用该结果指导Concolic测试,从而极大地减少测... 该文提出了一种基于二进制补丁比对的Concolic测试方法,用于对软件进行漏洞分析。该方法将补丁比对技术与Concolic测试方法进行了结合,首先通过补丁比对收集存在漏洞Sink点的程序路径,然后利用该结果指导Concolic测试,从而极大地减少测试的路径数量。研究结果表明:相对于传统的Concolic测试,该方法能够较为有效地指导Concolic测试,能够减少测试路径的数量,降低测试过程中资源的开销,是一种漏洞发现和验证的有效手段。 展开更多
关键词 concolic测试 补丁比对 漏洞分析
原文传递
基于路径引导的回归测试用例集扩增方法 被引量:2
7
作者 殷鹏川 贲可荣 《计算机工程与科学》 CSCD 北大核心 2014年第11期2159-2163,共5页
为了全面测试演化软件,回归测试通常需要生成新的测试用例。concolic测试是一种沿着具体执行路径进行符号执行的软件验证技术,通过生成测试数据来执行程序的所有可行路径。回归测试中,由于concolic测试关注于程序本身,没有利用已有测试... 为了全面测试演化软件,回归测试通常需要生成新的测试用例。concolic测试是一种沿着具体执行路径进行符号执行的软件验证技术,通过生成测试数据来执行程序的所有可行路径。回归测试中,由于concolic测试关注于程序本身,没有利用已有测试用例和软件演化信息,导致生成大量无效测试数据,浪费资源和时间。为解决此问题,提出一种基于路径引导的回归测试用例集扩增方法。该方法将目标路径作为引导,根据软件演化信息选择有利于覆盖目标路径的测试用例,利用已有测试用例跳过重叠初始子路径,对后续目标子路径进行concolic测试并生成覆盖目标路径的测试数据。案例分析表明,本文方法相比传统concolic测试,本方法在覆盖程序可行路径的同时,可有效减少concolic测试路径,提高测试数据生成效率。 展开更多
关键词 回归测试 concolic测试 测试用例集扩增 测试数据生成 路径覆盖
在线阅读 下载PDF
SHFuzz:A Hybrid Fuzzing Method Assisted by Static Analysis for Binary Programs 被引量:1
8
作者 Wenjie Wang Donghai Tian +4 位作者 Rui Ma Hang Wei Qianjin Ying Xiaoqi Jia Lei Zuo 《China Communications》 SCIE CSCD 2021年第8期1-16,共16页
Fuzzing is an effective technique to find security bugs in programs by quickly exploring the input space of programs.To further discover vulnerabilities hidden in deep execution paths,the hybrid fuzzing combines fuzzi... Fuzzing is an effective technique to find security bugs in programs by quickly exploring the input space of programs.To further discover vulnerabilities hidden in deep execution paths,the hybrid fuzzing combines fuzzing and concolic execution for going through complex branch conditions.In general,we observe that the execution path which comes across more and complex basic blocks may have a higher chance of containing a security bug.Based on this observation,we propose a hybrid fuzzing method assisted by static analysis for binary programs.The basic idea of our method is to prioritize seed inputs according to the complexity of their associated execution paths.For this purpose,we utilize static analysis to evaluate the complexity of each basic block and employ the hardware trace mechanism to dynamically extract the execution path for calculating the seed inputs’weights.The key advantage of our method is that our system can test binary programs efficiently by using the hardware trace and hybrid fuzzing.To evaluate the effectiveness of our method,we design and implement a prototype system,namely SHFuzz.The evaluation results show SHFuzz discovers more unique crashes on several real-world applications and the LAVA-M dataset when compared to the previous solutions. 展开更多
关键词 hybrid fuzzing static analysis concolic execution binary programs
在线阅读 下载PDF
Adaptive Emulation Framework for Multi-Architecture IoT Firmware Testing
9
作者 Jihyeon Yu Juhwan Kim +2 位作者 Youngwoo Lee Fayozbek Rustamov Joobeom Yun 《Computers, Materials & Continua》 SCIE EI 2023年第5期3291-3315,共25页
Internet of things(IoT)devices are being increasingly used in numerous areas.However,the low priority on security and various IoT types have made these devices vulnerable to attacks.To prevent this,recent studies have... Internet of things(IoT)devices are being increasingly used in numerous areas.However,the low priority on security and various IoT types have made these devices vulnerable to attacks.To prevent this,recent studies have analyzed firmware in an emulation environment that does not require actual devices and is efficient for repeated experiments.However,these studies focused only on major firmware architectures and rarely considered exotic firmware.In addition,because of the diversity of firmware,the emulation success rate is not high in terms of large-scale analyses.In this study,we propose the adaptive emulation framework for multi-architecture(AEMA).In the field of automated emulation frameworks for IoT firmware testing,AEMA considers the following issues:(1)limited compatibility for exotic firmware architectures,(2)emulation instability when configuring an automated environment,and(3)shallow testing range resulting from structured inputs.To tackle these problems,AEMAcan emulate not onlymajor firmware architectures but also exotic firmware architectures not previously considered,such as Xtensa,ColdFire,and reduced instruction set computer(RISC)version five,by implementing a minority emulator.Moreover,we applied the emulation arbitration technique and input keyword extraction technique for emulation stability and efficient test case generation.We compared AEMA with other existing frameworks in terms of emulation success rates and fuzz testing.As a result,AEMA succeeded in emulating 864 out of 1,083 overall experimental firmware and detected vulnerabilities at least twice as fast as the experimental group.Furthermore,AEMAfound a 0-day vulnerability in realworld IoT devices within 24 h. 展开更多
关键词 Internet of things(IoT) emulation framework FIRMWARE FUZZING concolic execution VULNERABILITY
在线阅读 下载PDF
符号执行技术在测试用例生成中的应用
10
作者 曾嘉彦 《现代计算机》 2017年第3期12-16,共5页
符号执行技术提出近四十年,随着计算机科学与技术的发展,在软件工程领域得到广泛的应用,成为一种流行的自动测试技术。对符号执行技术在测试用例生成中的应用展开综述,全方位地叙述符号执行技术的基本原理、面临的问题和挑战以及相应的... 符号执行技术提出近四十年,随着计算机科学与技术的发展,在软件工程领域得到广泛的应用,成为一种流行的自动测试技术。对符号执行技术在测试用例生成中的应用展开综述,全方位地叙述符号执行技术的基本原理、面临的问题和挑战以及相应的改进策略、相关的典型案例,并介绍和比较现有的工具,对学术界和工业界提供相应的参考。 展开更多
关键词 符号执行 concolic测试 自动化测试 测试用例生成
在线阅读 下载PDF
一种新的乳化剂(表面活性剂)——CONCOL.S
11
作者 葛树生 《石油石化节能》 1992年第5期10-10,共1页
该乳化剂(表面活性剂)是日本CONCOL.S公司经过多年的反复研究、实验而研制成功的。它与以往的乳化剂(表面活性剂)在成份组成上完全不同,它是通过保护胶休、分散剂等分散在水中碳元素的超微粒子(粒径为0.01~0.3μm的胶体状粒子)。因此,... 该乳化剂(表面活性剂)是日本CONCOL.S公司经过多年的反复研究、实验而研制成功的。它与以往的乳化剂(表面活性剂)在成份组成上完全不同,它是通过保护胶休、分散剂等分散在水中碳元素的超微粒子(粒径为0.01~0.3μm的胶体状粒子)。因此,吸附保护胶体的超碳元素微粒子形成了复合膜,重油成分中的高分子极性沥青质、树脂围在水粒子的表面。 展开更多
关键词 乳化剂 CONCOL.S 保护胶体 超微粒子 分子极性 沥青质 复合膜 碳元素 水滴型 田关
在线阅读 下载PDF
Modified condition decision coverage criteria for test suite prioritization using particle swarm optimization 被引量:1
12
作者 Gayatri Nayak Mitrabinda Ray 《International Journal of Intelligent Computing and Cybernetics》 EI 2019年第4期425-443,共19页
Purpose–Test suite prioritization technique is the process of modifying the order in which tests run to meet certain objectives.Early fault detection and maximum coverage of source code are the main objectives of tes... Purpose–Test suite prioritization technique is the process of modifying the order in which tests run to meet certain objectives.Early fault detection and maximum coverage of source code are the main objectives of testing.There are several test suite prioritization approaches that have been proposed at the maintenance phase of software development life cycle.A few works are done on prioritizing test suites that satisfy modified condition decision coverage(MC/DC)criteria which are derived for safety-critical systems.The authors know that it is mandatory to do MC/DC testing for Level A type software according to RTCA/DO178C standards.The paper aims to discuss this issue.Design/methodology/approach–This paper provides a novel method to prioritize the test suites for a system that includes MC/DC criteria along with other important criteria that ensure adequate testing.Findings–In this approach,the authors generate test suites from the input Java program using concolic testing.These test suites are utilized to measure MC/DC%by using the coverage calculator algorithm.Now,use MC/DC%and the execution time of these test suites in the basic particle swarm optimization technique with a modified objective function to prioritize the generated test suites.Originality/value–The proposed approach maximizes MC/DC%and minimizes the execution time of the test suites.The effectiveness of this approach is validated by experiments on 20 moderate-sized Java programs using average percentage of fault detected metric. 展开更多
关键词 Particle swarm optimization concolic testing MC/DC Test suite prioritization
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部