Fuzzing Adobe Acrobat Reader DC on windows platform
In this study, FOE2 was the Fuzzer used to fuzz Adobe Acrobat Reader DC on the windows platform. The objective is to find new attacking surfaces or crashes for Adobe Acrobat Reader that has never been documented before. The seed files were PDF documents obtained from the web. They were analysed befo...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2017
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/70494 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Summary: | In this study, FOE2 was the Fuzzer used to fuzz Adobe Acrobat Reader DC on the windows platform. The objective is to find new attacking surfaces or crashes for Adobe Acrobat Reader that has never been documented before. The seed files were PDF documents obtained from the web. They were analysed before the fuzzing campaign can begin. This paper provides a detailed explanation and steps for the fuzzing campaign and provides a crash analysis in the RESULTS sections. The crash found though was a partially reproducible crash, more work and research can be done on it to potentially elevate it to a more concrete crash case. |
---|