Solving real world security problems hacking and protection

Penetration testing of programs is very important in cyber security as security vulnerabilities usually occur as a result of slight programming errors. One such method is fuzzing. There is large number of fuzzing tools that are currently available, and multiple improvements have also been made to cu...

Full description

Saved in:
Bibliographic Details
Main Author: Ho, Zhi Hao
Other Authors: Liu Yang
Format: Final Year Project
Language:English
Published: 2017
Subjects:
Online Access:http://hdl.handle.net/10356/72823
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-72823
record_format dspace
spelling sg-ntu-dr.10356-728232023-03-03T20:32:35Z Solving real world security problems hacking and protection Ho, Zhi Hao Liu Yang School of Computer Science and Engineering DRNTU::Engineering::Computer science and engineering Penetration testing of programs is very important in cyber security as security vulnerabilities usually occur as a result of slight programming errors. One such method is fuzzing. There is large number of fuzzing tools that are currently available, and multiple improvements have also been made to current fuzzing techniques. The primary fuzzing tool used is the American Fuzzy Lop (AFL). This project tests programs for possible security vulnerabilities and intends to develop an improved version of the AFL. During the testing phase, target programs were initially chosen based on ease of fuzzing in order to understand how fuzzing is done. Upon understanding how the tool is used, commonly used libraries and programs were randomly chosen as the target program for fuzzing. During the development of the new fuzzing program, the Fuzzing Orchestration Tool (FOT), other programs like Django, python and Hypertext Markup Language (HTML) have been adopted in the development of the user interface. The user interface is made to ensure that information displayed are clear, concise and easily understandable. Graphs are also available to show the overall performance of the fuzzing tool, and only important information will be displayed. Further studies can also be conducted in the future to explore the implementation of other algorithms used by the different fuzzers into the FOT. Additional research can also be carried out on other fuzzing tools as the mutation algorithms used by the individual fuzzers work differently, and may hence produce different results. Bachelor of Engineering (Computer Engineering) 2017-11-23T08:34:53Z 2017-11-23T08:34:53Z 2017 Final Year Project (FYP) http://hdl.handle.net/10356/72823 en Nanyang Technological University 54 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering::Computer science and engineering
spellingShingle DRNTU::Engineering::Computer science and engineering
Ho, Zhi Hao
Solving real world security problems hacking and protection
description Penetration testing of programs is very important in cyber security as security vulnerabilities usually occur as a result of slight programming errors. One such method is fuzzing. There is large number of fuzzing tools that are currently available, and multiple improvements have also been made to current fuzzing techniques. The primary fuzzing tool used is the American Fuzzy Lop (AFL). This project tests programs for possible security vulnerabilities and intends to develop an improved version of the AFL. During the testing phase, target programs were initially chosen based on ease of fuzzing in order to understand how fuzzing is done. Upon understanding how the tool is used, commonly used libraries and programs were randomly chosen as the target program for fuzzing. During the development of the new fuzzing program, the Fuzzing Orchestration Tool (FOT), other programs like Django, python and Hypertext Markup Language (HTML) have been adopted in the development of the user interface. The user interface is made to ensure that information displayed are clear, concise and easily understandable. Graphs are also available to show the overall performance of the fuzzing tool, and only important information will be displayed. Further studies can also be conducted in the future to explore the implementation of other algorithms used by the different fuzzers into the FOT. Additional research can also be carried out on other fuzzing tools as the mutation algorithms used by the individual fuzzers work differently, and may hence produce different results.
author2 Liu Yang
author_facet Liu Yang
Ho, Zhi Hao
format Final Year Project
author Ho, Zhi Hao
author_sort Ho, Zhi Hao
title Solving real world security problems hacking and protection
title_short Solving real world security problems hacking and protection
title_full Solving real world security problems hacking and protection
title_fullStr Solving real world security problems hacking and protection
title_full_unstemmed Solving real world security problems hacking and protection
title_sort solving real world security problems hacking and protection
publishDate 2017
url http://hdl.handle.net/10356/72823
_version_ 1759855829352185856