Revolutionizing The Field Of Grey-Box Attack Surface Testing With Evolutionary Fuzzing presented at Blackhat USA 2007

by Dr. Bill Punch,

Tags: Security Fuzzing Testing

Summary : Runtime code coverage analysis is
feasible and useful when application source code is not available. An
evolutionary test tool receiving such statistics can use that
information as fitness for pools of sessions to actively learn the
interface protocol. We call this activity grey-box fuzzing. We intend to
show that, when applicable, grey-box fuzzing is more effective at
finding bugs than RFC compliant or capture-replay mutation black-box
tools. This research is focused on building a better/new breed of
fuzzer. The impact of which is the discovery of difficult to find bugs
in real world applications which are accessible (not theoretical).