Guang-Hong Liu’s research while affiliated with University of Science and Technology of China and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (1)


Vulnerability Analysis for X86 Executables Using Genetic Algorithm and Fuzzing
  • Article

November 2008

·

184 Reads

·

23 Citations

Guang-Hong Liu

·

Gang Wu

·

·

[...]

·

Zhuo-Chun Tang

Fuzzing was successfully used to discover security bugs in popular programs, though released without source code. It becomes a major tool in security analysis, but needs large input space, ineffective. This paper presents a new method for the identification of vulnerabilities in executable program called GAFuzzing (Genetic Algorithm Fuzzing), which combines static and dynamic analysis to extend random Fuzzing. First, it uses static analysis to obtain the structural behavior, interface and interest region of code, then formally describes test requirement. Second, it uses genetic algorithm to intelligently direct test data generation and improve the testing objective. Unlike many software testing tools, our implementation analyzes the executables without source code directly. Our evaluation shows that GAFuzzing is superior to random Fuzzing for vulnerabilty analysis.

Citations (1)


... Table 7 summarizes all the metaheuristics and fitness functions related to code coverage testing using metaheuristics. The used meta-heuristics are the genetic algorithm (GA) (Fraser and Arcuri 2011;Charmchi and Cami 2021;Michael et al. 2001;Bottaci 2002;Sparks et al. 2007;Liu et al. 2008;Cao et al. 2009a, b;Rauf et al. 2010;Andrews et al. 2014;Shuai et al. 2013Shuai et al. , 2015aPałka et al. 2016;Paduraru et al. 2017;Arcuri 2017;Wei et al. 2018;Zhu et al. 2018;Wang et al. 2019b), evolutionary algorithm (EA) (Harman et al. 2002;Tlili et al. 2006;Baresel and Sthamer 2003;Afshan et al. 2013; LD(N(pa, AL(pa, i)), i)) Harman et al. (2002) Evolutionary algorithm Branch distance Bottaci (2002) Genetic algorithm Relational and logical predicate Baresel and Sthamer (2003) Evolutionary algorithm Node-node oriented fitness function Evolutionary algorithm The fitness of the sequence is determined based on the closest path to the test aim ...

Reference:

A systematic literature review on software security testing using metaheuristics
Vulnerability Analysis for X86 Executables Using Genetic Algorithm and Fuzzing
  • Citing Article
  • November 2008