Browse > Article
http://dx.doi.org/10.13089/JKIISC.2015.25.1.31

Method of Fuzzing Document Application Based on Android Devices  

Jo, Je-Gyeong (Chung-Nam National University)
Ryou, Jae-Cheol (Chung-Nam National University)
Abstract
As the forms of cyberattacks become diverse, there has been reported another case of exploiting vulnerabilities revealed while processing either a document or multimedia file that was distributed for attacking purpose, which would replace the traditional method of distributing malwares directly. The attack is based upon the observation that the softwares such as document editer or multimedia player may reveal inherent vulnerabilities on some specific inputs. The fuzzing methods that provide invalid random inputs for test purpose could discover such exploits. This paper suggests a new fuzzing method on document applications that could work in mobile environments, in order to resolve the drawback that the existing methods run only in PC environments. Our methods could effectively discover the exploits of mobile applications, and thus could be utilized as a means of dealing with APT attacks in mobile environments.
Keywords
SmartPhone; Android; Fuzzing; Document; Vulnerability;
Citations & Related Records
연도 인용수 순위
  • Reference
1 "Fuzzing - Mutation vs. Generation," http://resources.infosecinstitute.com/fuzzing-mutation-vs-generation/
2 Hui Ye, Shaoyin Cheng, Lanbo Zhang and Fan Jiang, "DroidFuzzer: Fuzzing the Android Apps with Intent-Filter Tag," International Conference on Advances in Mobile Computing & Multimedia, pp. 68-74, Dec. 2013.
3 "UI/Application Exerciser Monkey." http://developer.android.com/tools/help/monkey.html
4 Aravind MacHiry, Rohan Tahiliani and Mayur Naik, "Dynodroid: An Input Generation System for Android Apps," ESEC/FSE 2013 Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering, pp 224-234, Aug, 2013
5 Android.Database, "Android Developers," http://developer.android.com/reference/android/database/package-summary.html
6 Korea Internet & Security Agency, "A Study on Major Domestic S/W Vulnerability Discovery and Analysis Method," 2012.10