Design and Realization of IE Vulnerabilities Mining Based on Fuzz Testing

Article Preview

Abstract:

In order to detect Internet Explorer browser vulnerabilities, the miner distributed with test method based on the DOM tree are designed and implemented, it also implemented dynamic selection of the test case execution, experiment results found 50 IE vulnerabilities.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2032-2035

Citation:

Online since:

September 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] HOU Ying, HONG Zheng, PAN Fan, WU Li-fa. Model Based Automatic Fuzzing Script Generation [J]. Computer Science, 2013, 40(3): 206-209. DOI: 10. 3969/j. issn. 1002-137X. 2013. 03. 046.

Google Scholar

[2] NIE Sen, LI Xiao, WANG Yi-jun, XUE Zhi. An Improved Design for Smart Fuzzing Platform[J]. Information Security and Communications Privacy, 2013, (12): 134-139.

Google Scholar

[3] Information on http: /peachfuzzer. com.

Google Scholar

[4] TANG Zhang-guo, ZHONG Ming-quan, LI Huan-zhou, ZHANG Jian. File Format Vulnerability Exploiting Technique Based on Fuzzing [J]. COMPUTER ENGINEERING, 2010, 36(16): 151-153, 160. DOI: 10. 3969/j. issn. 1000-3428. 2010. 16. 055.

Google Scholar

[5] LI Ning LI Zhan-huai. Research and practice of software test policies based on black box testing [J]. APPLICATION RESEARCH OF COMPUTERS, 2009, 26(3): 923-926. DOI: 10. 3969/j. issn. 1001-3695. 2009. 03. 038.

Google Scholar