Hacking of the world : investigation on expansion of attack vectors

Expansion of attack vectors via fuzzing was achieved by acquiring relevant seeds from a large corpus in a short time span. We present a framework capable of extracting, categorising and managing object streams from fuzzing seeds according to type and relevance. Heuristic function of the framewor...

Full description

Saved in:
Bibliographic Details
Main Author: Yap, Yao Ming
Other Authors: Liu Yang
Format: Final Year Project
Language:English
Published: 2017
Subjects:
Online Access:http://hdl.handle.net/10356/70511
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-70511
record_format dspace
spelling sg-ntu-dr.10356-705112023-03-03T20:29:15Z Hacking of the world : investigation on expansion of attack vectors Yap, Yao Ming Liu Yang School of Computer Science and Engineering Centre for Computational Intelligence DRNTU::Engineering::Computer science and engineering::Software::Software engineering DRNTU::Engineering::Computer science and engineering::Software::Operating systems Expansion of attack vectors via fuzzing was achieved by acquiring relevant seeds from a large corpus in a short time span. We present a framework capable of extracting, categorising and managing object streams from fuzzing seeds according to type and relevance. Heuristic function of the framework was built upon experimentation and investigation into object streams. The result is a framework capable of processing a 78KB file with multiple objects in 29 seconds, a vast improvement in comparison to similar average timing for manual processing of only 1 object. 100 small to medium sized PDF (< 1000KB each) in 49 minutes. 14 seeds processed by framework were fuzzed using Failure Observation Engine (FOE) 2.1, each with minimum 50k iterations. No crashes were produced. Bachelor of Engineering (Computer Science) 2017-04-26T03:46:06Z 2017-04-26T03:46:06Z 2017 Final Year Project (FYP) http://hdl.handle.net/10356/70511 en Nanyang Technological University 59 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering::Computer science and engineering::Software::Software engineering
DRNTU::Engineering::Computer science and engineering::Software::Operating systems
spellingShingle DRNTU::Engineering::Computer science and engineering::Software::Software engineering
DRNTU::Engineering::Computer science and engineering::Software::Operating systems
Yap, Yao Ming
Hacking of the world : investigation on expansion of attack vectors
description Expansion of attack vectors via fuzzing was achieved by acquiring relevant seeds from a large corpus in a short time span. We present a framework capable of extracting, categorising and managing object streams from fuzzing seeds according to type and relevance. Heuristic function of the framework was built upon experimentation and investigation into object streams. The result is a framework capable of processing a 78KB file with multiple objects in 29 seconds, a vast improvement in comparison to similar average timing for manual processing of only 1 object. 100 small to medium sized PDF (< 1000KB each) in 49 minutes. 14 seeds processed by framework were fuzzed using Failure Observation Engine (FOE) 2.1, each with minimum 50k iterations. No crashes were produced.
author2 Liu Yang
author_facet Liu Yang
Yap, Yao Ming
format Final Year Project
author Yap, Yao Ming
author_sort Yap, Yao Ming
title Hacking of the world : investigation on expansion of attack vectors
title_short Hacking of the world : investigation on expansion of attack vectors
title_full Hacking of the world : investigation on expansion of attack vectors
title_fullStr Hacking of the world : investigation on expansion of attack vectors
title_full_unstemmed Hacking of the world : investigation on expansion of attack vectors
title_sort hacking of the world : investigation on expansion of attack vectors
publishDate 2017
url http://hdl.handle.net/10356/70511
_version_ 1759854411963695104