Solving real world security problems hacking and protection
Penetration testing of programs is very important in cyber security as security vulnerabilities usually occur as a result of slight programming errors. One such method is fuzzing. There is large number of fuzzing tools that are currently available, and multiple improvements have also been made to cu...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2017
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/72823 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-72823 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-728232023-03-03T20:32:35Z Solving real world security problems hacking and protection Ho, Zhi Hao Liu Yang School of Computer Science and Engineering DRNTU::Engineering::Computer science and engineering Penetration testing of programs is very important in cyber security as security vulnerabilities usually occur as a result of slight programming errors. One such method is fuzzing. There is large number of fuzzing tools that are currently available, and multiple improvements have also been made to current fuzzing techniques. The primary fuzzing tool used is the American Fuzzy Lop (AFL). This project tests programs for possible security vulnerabilities and intends to develop an improved version of the AFL. During the testing phase, target programs were initially chosen based on ease of fuzzing in order to understand how fuzzing is done. Upon understanding how the tool is used, commonly used libraries and programs were randomly chosen as the target program for fuzzing. During the development of the new fuzzing program, the Fuzzing Orchestration Tool (FOT), other programs like Django, python and Hypertext Markup Language (HTML) have been adopted in the development of the user interface. The user interface is made to ensure that information displayed are clear, concise and easily understandable. Graphs are also available to show the overall performance of the fuzzing tool, and only important information will be displayed. Further studies can also be conducted in the future to explore the implementation of other algorithms used by the different fuzzers into the FOT. Additional research can also be carried out on other fuzzing tools as the mutation algorithms used by the individual fuzzers work differently, and may hence produce different results. Bachelor of Engineering (Computer Engineering) 2017-11-23T08:34:53Z 2017-11-23T08:34:53Z 2017 Final Year Project (FYP) http://hdl.handle.net/10356/72823 en Nanyang Technological University 54 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Computer science and engineering |
spellingShingle |
DRNTU::Engineering::Computer science and engineering Ho, Zhi Hao Solving real world security problems hacking and protection |
description |
Penetration testing of programs is very important in cyber security as security vulnerabilities usually occur as a result of slight programming errors. One such method is fuzzing. There is large number of fuzzing tools that are currently available, and multiple improvements have also been made to current fuzzing techniques. The primary fuzzing tool used is the American Fuzzy Lop (AFL). This project tests programs for possible security vulnerabilities and intends to develop an improved version of the AFL. During the testing phase, target programs were initially chosen based on ease of fuzzing in order to understand how fuzzing is done. Upon understanding how the tool is used, commonly used libraries and programs were randomly chosen as the target program for fuzzing.
During the development of the new fuzzing program, the Fuzzing Orchestration Tool (FOT), other programs like Django, python and Hypertext Markup Language (HTML) have been adopted in the development of the user interface. The user interface is made to ensure that information displayed are clear, concise and easily understandable. Graphs are also available to show the overall performance of the fuzzing tool, and only important information will be displayed. Further studies can also be conducted in the future to explore the implementation of other algorithms used by the different fuzzers into the FOT. Additional research can also be carried out on other fuzzing tools as the mutation algorithms used by the individual fuzzers work differently, and may hence produce different results. |
author2 |
Liu Yang |
author_facet |
Liu Yang Ho, Zhi Hao |
format |
Final Year Project |
author |
Ho, Zhi Hao |
author_sort |
Ho, Zhi Hao |
title |
Solving real world security problems hacking and protection |
title_short |
Solving real world security problems hacking and protection |
title_full |
Solving real world security problems hacking and protection |
title_fullStr |
Solving real world security problems hacking and protection |
title_full_unstemmed |
Solving real world security problems hacking and protection |
title_sort |
solving real world security problems hacking and protection |
publishDate |
2017 |
url |
http://hdl.handle.net/10356/72823 |
_version_ |
1759855829352185856 |