• Title/Summary/Keyword: Fuzz

Search Result 33, Processing Time 0.03 seconds

Measurement of Fuzz Fibers on Fabric Surface Using Image Analysis Methods

  • Ucar Nuray;Boyraz Plnar
    • Fibers and Polymers
    • /
    • v.6 no.1
    • /
    • pp.79-81
    • /
    • 2005
  • Fuzz on the fabrics, which is the fibers protruded from the fabric surface, is very important in view of appearance quality, since it causes unpleasant appearance on the fabrics and also leads to pilling which makes fabric appearance and soft­ness worse. However, fuzz on fabric surface is measured mostly by subjective methods (human vision) rather than objective methods. Thus, in this study, objective method using image analysis techniques has been developed for the measurement of fuzz on fabric surface. Fuzz on the fabric has also been ranked and rated by experts in order to see the reliability of the results obtained from the fuzz measurement. It was observed that correlation coefficient (r) between rating value and objective mea­surement value was 0.9 and this correlation coefficient value confirmed the reliability of this method.

A Practical Intent Fuzzing Tool for Robustness of Inter-Component Communication in Android Apps

  • Choi, Kwanghoon;Ko, Myungpil;Chang, Byeong-Mo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4248-4270
    • /
    • 2018
  • This research aims at a new practical Intent fuzzing tool for detecting Intent vulnerabilities of Android apps causing the robustness problem. We proposed two new ideas. First, we designed an Intent specification language to describe the structure of Intent, which makes our Intent fuzz testing tool flexible. Second, we proposed an automatic tally method classifying unique failures. With the two ideas, we implemented an Intent fuzz testing tool called Hwacha, and evaluated it with 50 commercial Android apps. Our tool offers an arbitrary combination of automatic and manual Intent generators with executors such as ADB and JUnit due to the use of the Intent specification language. The automatic tally method excluded almost 80% of duplicate failures in our experiment, reducing efforts of testers very much in review of failures. The tool uncovered more than 400 unique failures including what is unknown so far. We also measured execution time for Intent fuzz testing, which has been rarely reported before. Our tool is practical because the whole procedure of fuzz testing is fully automatic and the tool is applicable to the large number of Android apps with no human intervention.

ER-Fuzz : Conditional Code Removed Fuzzing

  • Song, Xiaobin;Wu, Zehui;Cao, Yan;Wei, Qiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3511-3532
    • /
    • 2019
  • Coverage-guided fuzzing is an efficient solution that has been widely used in software testing. By guiding fuzzers through the coverage information, seeds that generate new paths will be retained to continually increase the coverage. However, we observed that most samples follow the same few high-frequency paths. The seeds that exercise a high-frequency path are saved for the subsequent mutation process until the user terminates the test process, which directly affects the efficiency with which the low-frequency paths are tested. In this paper, we propose a fuzzing solution, ER-Fuzz, that truncates the recording of a high-frequency path to influence coverage. It utilizes a deep learning-based classifier to locate the high and low-frequency path transfer points; then, it instruments at the transfer position to promote the probability low-frequency transfer paths while eliminating subsequent variations of the high-frequency path seeds. We implemented a prototype of ER-Fuzz based on the popular fuzzer AFL and evaluated it on several applications. The experimental results show that ER-Fuzz improves the coverage of the original AFL method to different degrees. In terms of the number of crash discoveries, in the best case, ER-Fuzz found 115% more unique crashes than did AFL. In total, seven new bugs were found and new CVEs were assigned.

An Empirical Study of Security for API in Windows Systems (윈도우즈에서 제공되는 기본 API에 대한 안전성 고찰)

  • Choi, Young-Han;Kim, Hyoung-Chun;Oh, Hyung-Geun;Lee, Do-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.2
    • /
    • pp.75-82
    • /
    • 2009
  • In this paper, we test for security targeting on APIs of Windows as that is used by many people worldwide. In order to test APIs in DLL fils of Windows OS, we propose Automated Windows API Fuzz Testing(AWAFT) that can execute fuzz testing automatically and implemented the practical tool for AWAFT. AWAFT focuses on buffer overflows and parsing errors of function parameters. Using the tool, we found 177 errors in the system folder of Windows XP SP2. Therefore, AWAFT is useful for security testing of Windows APIs. AWAFT can be applied to libraries of third party software in Windows OS for the security.

The Status Quo and Future of Software Regression Bug Discovery via Fuzz Testing (퍼즈 테스팅을 통한 소프트웨어 회귀 버그 탐색 기법의 동향과 전망)

  • Lee, Gwangmu;Lee, Byoungyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.911-917
    • /
    • 2021
  • As software gets an increasing amount of patches, lots of software bugs are increasingly caused by such software patches, collectively known as regression bugs. To proactively detect the regressions bugs, both industry and academia are actively searching for a way to augment fuzz testing, one of the most popular automatic bug detection techniques. In this paper, we investigate the status quo of the studies on augmenting fuzz testing for regression bug detection and, based on the limitations of current proposals, provide an outlook of the relevant research.

Firmware Fuzzing Method through Pseudo-HAL Identification (유사 HAL 함수 탐색을 통한 펌웨어 퍼징 기법)

  • Jeong, Seyeon;Hwang, Eunbi;Cho, Yeongpil;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1121-1125
    • /
    • 2022
  • HAL-Fuzz, a fuzzing technique to find firmware vulnerabilities, is efficient by using the HAL function of the hardware abstraction layer provided by MCU vendors. However, it cannot handle most firmware that unused the exact HAL function. In this paper, we propose a new method for identifying pseudo-HAL functions to increase the fuzzing availability of HAL-Fuzz. In experiments, we identified not only the HAL but also the pseudo-HAL functions, implemented by the developer, and that fuzzing is possible.

Monitoring of Dust Concentration Generated during Peach Sorting Operations (복숭아 선별작업장의 미세먼지의 발생특성 모니터링)

  • Seo, Hyo-Jae;Seo, Il-Hwan
    • Journal of Bio-Environment Control
    • /
    • v.31 no.3
    • /
    • pp.237-245
    • /
    • 2022
  • Peach is a typical summer fruit which can be used for various food, processed food, and fragrance ingredients in Korea. Peach is also known as one of serious allergens which make difficulty for farm workers during peach sorting operations. After peach harvesting, it moves to the sorting operations for removing cover material, removing fuzz on peach surface, sorting by size, and packing. The air-samplers and optical particle counters were used to analyze the characteristics of fine dust generation by location and operation characteristics in the experimental peach farms. During removing peach fuzz, the dust concentrations were increased by 6.89 times on total suspended particulate (TSP), 2.13 times on PM-10 (particulate matter), and 1.30 times on PM-2.5 compared to non-working periods, respectively. During removing peach covering materials, the dust concentrations were increased by 3.14 times on TSP, 1.91 times on PM-10, and 1.43 times on PM-2.5 compared to non-working periods, respectively. This represents peach fuzz can be affected to farm workers during peach sorting operations.

Residue Patterns of Insecticide Flubendiamide by Varieties of Peaches (살충제 Flubendiamide의 복숭아 품종에 따른 잔류양상)

  • Kim, Hyo-Young;Hwang, Jeong-In;Lee, Eun-Hyang;Jeon, Young-Hwan;Kim, Ji-Hwan;Ahn, Ji-Woon;Park, Hyun-Ju;Chung, Chang-Kook;Kim, San-Yeong;Lee, Suk-Hee;Kim, Jang-Eok
    • Korean Journal of Environmental Agriculture
    • /
    • v.31 no.2
    • /
    • pp.152-156
    • /
    • 2012
  • BACKGROUND: This research has investigated the residue patterns of insecticide flubendiamide on three species of peaches with different surface forms, and the residue amounts of them when mixed with a spreader. METHODS AND RESULTS: Pesticide used for field application on peaches was 20% flubendiamide of suspension concentrate(SC) and was sprayed at a recommended rate. The residue amounts of flubendiamide in peach were analyzed by HPLC equipped with UV detector. After the observation with a microscope, the rank of fuzz amount on peach's surface was Kurakatawase, Wolmi in descending order and Cheonhong did not have any fuzz. The residue amounts of flubendiamide were 0.54 mg/kg for Kurakatawase, 0.43 mg/kg for Wolmi and 0.10 mg/kg for Cheonhong, respectively. When flubendiamide was used with a spreader, polyoxy ethylene methylpoly siloxane, the residue amount for Kurakatawase barely changed at 0.55 mg/kg regardless of mixing with a spreader, and at 0.53 mg/kg for Wolmi. In Cheonhong, the residue amount was 0.48 mg/kg, which increased by 4.8 times due to the use of a spreader. CONCLUSION: This result indicates that the residue amounts of flubendiamde were affected by the surface forms of peaches, and in the presence of a spreader the residue amount did not increase in fuzzy species, but was affected greatly for species without fuzz.

A Design of X-Band Tile Type Active Transmit/Receive Module (X 대역 타일형 능동 송수신 모듈 설계)

  • Ha, Jung-Hyen;Moon, Ju-Young;Lee, Ki-Won;Nam, Byung-Chang;Yun, Sang-Won
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.21 no.12
    • /
    • pp.1467-1474
    • /
    • 2010
  • A tile type active T/R(Transmit/Receive) module for X-band active array radar is demonstrated in this paper. Proposed tile type structure based on fuzz button solderless vertical interconnection shows wide band characteristic of about 30 % bandwidth in X-band with insertion loss of below 0.6 dB and input and output VSWR of less than 1.7. Moreover, the mismatching generally appeared in the vertical interconnection which shown wide band characteristic can also be minimized and, therefore, good gain flatness can be achieved.

Survey on Advances in Test Case Generation and Reduction Algorithm of Fuzz Testing (퍼징 테스트 케이스 생성 및 축약 알고리즘 발전에 대한 연구)

  • Bae, Hyo-Bin;Eom, Jung-Ho;Kim, Hyun-Joo;Kim, Ik-Kyun;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.831-834
    • /
    • 2013
  • 최근 퍼징(Fuzzing, Fuzz Testing)이 소프트웨어의 취약점을 찾아내기 위한 방법으로 활발하게 사용되고 있다. 퍼징은 반복적으로 비정상적인 데이터를 무작위로 생성하여 대상 소프트웨어에 입력 값으로 전달해 오작동을 유도하고, 오작동의 원인을 분석하여 소프트웨어의 취약성을 찾아낸다. 퍼징에서 사용되는 입력 값인 테스트 케이스에 따라서 취약점 탐지율 및 탐지 시간이 결정된다. 따라서 어떻게, 어떤 테스트 케이스를 생성하여 퍼징을 실행 할 것인지가 퍼징 연구의 핵심이다. 퍼징을 위해 생성하는 테스트 케이스는 숫자가 굉장히 많기 때문에 최근에 테스트 케이스의 크기를 축약하여 퍼징 결과 분석을 위해 소요되는 시간을 줄이는 연구가 발하게 진행되고 있다. 본 논문에서는 테스트 케이스 축약에 이용되는 다양한 알고리즘들에 대해 소개하고, 그 각각을 비교 분석하여 향후 퍼징의 테스트 케이스 축약에 관한 연구에 기여하고자 한다.