Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Fuzzy testing method and computer readable storage medium

A fuzz testing and seed technology, applied in the field of fuzz testing methods and computer-readable storage media, to achieve the effects of good code coverage, small overhead, and improved fuzz testing efficiency

Pending Publication Date: 2022-05-06
SHENZHEN GRADUATE SCHOOL TSINGHUA UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In order to solve the existing problems, the present invention provides a fuzzy testing method and a computer-readable storage medium

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fuzzy testing method and computer readable storage medium
  • Fuzzy testing method and computer readable storage medium
  • Fuzzy testing method and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the technical problems, technical solutions and beneficial effects to be solved by the embodiments of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0026] It should be noted that when an element is referred to as being “fixed” or “disposed on” another element, it may be directly on the other element or be indirectly on the other element. When an element is referred to as being "connected to" another element, it can be directly connected to the other element or indirectly connected to the other element. In addition, the connection can be used for both fixing function and circuit communication function.

[0027] It is to be understood that the terms "length", "width", "top", "bottom", "front"...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a fuzzy test method and a computer readable storage medium, and the method comprises the following steps: generating mutation input: S1, executing byte analysis on each seed in a seed queue to identify bytes related to verification check, the byte analysis comprising attempting to mutate all bytes in the seed, obtaining the score value of the byte according to the path change condition of the abrupt change input; and S2, determining whether the bytes are mutated or not according to the score values of the bytes. According to the method, a novel lightweight mutation strategy is used for increasing the possibility of generating legal mutation input; furthermore, a larger code coverage rate is realized within the same time, and the fuzzy testing efficiency is improved.

Description

technical field [0001] The invention relates to the technical field of fuzz testing, in particular to a fuzz testing method and a computer-readable storage medium. Background technique [0002] As the Internet is used more and more widely in various fields, security issues are becoming more and more important, and vulnerability mining is a branch of the security field, which has developed rapidly in recent years. Vulnerability mining is the exploration of unknown vulnerabilities in the target program, through symbol analysis, taint analysis and other techniques to find potential undiscovered vulnerabilities in the target program. If the traditional vulnerability mining technology is used to analyze the target program, it often takes a lot of time, resources and manpower, and it cannot find all the loopholes in the target program well, which accelerates the research progress of the vulnerability mining technology. . Fuzzing (fuzzing) is between purely manual analysis of vul...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F11/36
CPCG06F21/577G06F11/3676G06F11/3684G06F11/3688G06F2221/033
Inventor 肖喜张锟鹏夏树涛郑海涛江勇陆孺牛
Owner SHENZHEN GRADUATE SCHOOL TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products