loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Zhao Chao ; Pan Zulie ; Huang Zhao and Huang Hui

Affiliation: National University of Defense Technology, China

Keyword(s): Symbolic execution, Automatic analysis, vulnerability.

Abstract: In recent years, the number of software vulnerabilities has been on the rise, and the harm of software vulnerabilities has become more and more serious. However, there are so many software vulnerabilities that simple manual analysis cannot meet the requirements. In view of the above problems, this paper introduces CRAX. CRAX is a new framework based on symbolic execution. And it is to act as a backend of static/dynamic program analyzers, bug finders, fuzzers, and crash report database. It can automatically, efficiently and quickly analyze software vulnerabilities and generate stable and efficient test cases. The paper analyzes CRAX's automatic analysis process of vulnerability program and the generation process of test cases in detail, and in chapter 3 and chapter 4, it emphatically introduces the constraint construction and reconstruction process in the process of CRAX's automatic analysis.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.147.42.168

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Chao, Z.; Zulie, P.; Zhao, H. and Hui, H. (2019). Analysis of the CRAX Vulnerability Automatic Utilization Process. In Proceedings of the International Conference on Advances in Computer Technology, Information Science and Communications - CTISC; ISBN 978-989-758-357-5, SciTePress, pages 32-37. DOI: 10.5220/0008097100320037

@conference{ctisc19,
author={Zhao Chao. and Pan Zulie. and Huang Zhao. and Huang Hui.},
title={Analysis of the CRAX Vulnerability Automatic Utilization Process},
booktitle={Proceedings of the International Conference on Advances in Computer Technology, Information Science and Communications - CTISC},
year={2019},
pages={32-37},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0008097100320037},
isbn={978-989-758-357-5},
}

TY - CONF

JO - Proceedings of the International Conference on Advances in Computer Technology, Information Science and Communications - CTISC
TI - Analysis of the CRAX Vulnerability Automatic Utilization Process
SN - 978-989-758-357-5
AU - Chao, Z.
AU - Zulie, P.
AU - Zhao, H.
AU - Hui, H.
PY - 2019
SP - 32
EP - 37
DO - 10.5220/0008097100320037
PB - SciTePress