• Title/Summary/Keyword: Fuzz

Search Result 34, Processing Time 0.028 seconds

Measurement of Fuzz Fibers on Fabric Surface Using Image Analysis Methods

  • Ucar Nuray;Boyraz Plnar
    • Fibers and Polymers
    • /
    • v.6 no.1
    • /
    • pp.79-81
    • /
    • 2005
  • Fuzz on the fabrics, which is the fibers protruded from the fabric surface, is very important in view of appearance quality, since it causes unpleasant appearance on the fabrics and also leads to pilling which makes fabric appearance and soft­ness worse. However, fuzz on fabric surface is measured mostly by subjective methods (human vision) rather than objective methods. Thus, in this study, objective method using image analysis techniques has been developed for the measurement of fuzz on fabric surface. Fuzz on the fabric has also been ranked and rated by experts in order to see the reliability of the results obtained from the fuzz measurement. It was observed that correlation coefficient (r) between rating value and objective mea­surement value was 0.9 and this correlation coefficient value confirmed the reliability of this method.

H-Fuzz: A Snapshot-Based Practical Hybrid Fuzzing (H-Fuzz: 스냅샷 기반의 실용적인 하이브리드 퍼징)

  • Jae-young Chung;Byoung-young Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.245-247
    • /
    • 2024
  • 프로그램의 버그는 해커에 의해 악용될 수 있기 때문에, 이를 사전에 발견하는 것이 매우 중요하다. 최근에는 프로그램의 취약점을 자동으로 찾기 위해 하이브리드 퍼징 기술이 연구되고 있다. 우리는 기존 하이브리드 퍼저들의 한계점인 부족한 확장성을 해결하고자, 스냅샷 기반 하이브리드 퍼저인 H-Fuzz 를 제안한다. H-Fuzz 는 스냅샷 기반 퍼징을 도입하여 하이브리드 퍼징의 확장성 부족 문제를 해결하였다. 그리고 기존 커버리지 기반 퍼저에 비해 H-Fuzz 가 버그를 발견하는데 효과적임을 실험을 통해 확인하였다.

A Practical Intent Fuzzing Tool for Robustness of Inter-Component Communication in Android Apps

  • Choi, Kwanghoon;Ko, Myungpil;Chang, Byeong-Mo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4248-4270
    • /
    • 2018
  • This research aims at a new practical Intent fuzzing tool for detecting Intent vulnerabilities of Android apps causing the robustness problem. We proposed two new ideas. First, we designed an Intent specification language to describe the structure of Intent, which makes our Intent fuzz testing tool flexible. Second, we proposed an automatic tally method classifying unique failures. With the two ideas, we implemented an Intent fuzz testing tool called Hwacha, and evaluated it with 50 commercial Android apps. Our tool offers an arbitrary combination of automatic and manual Intent generators with executors such as ADB and JUnit due to the use of the Intent specification language. The automatic tally method excluded almost 80% of duplicate failures in our experiment, reducing efforts of testers very much in review of failures. The tool uncovered more than 400 unique failures including what is unknown so far. We also measured execution time for Intent fuzz testing, which has been rarely reported before. Our tool is practical because the whole procedure of fuzz testing is fully automatic and the tool is applicable to the large number of Android apps with no human intervention.

ER-Fuzz : Conditional Code Removed Fuzzing

  • Song, Xiaobin;Wu, Zehui;Cao, Yan;Wei, Qiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3511-3532
    • /
    • 2019
  • Coverage-guided fuzzing is an efficient solution that has been widely used in software testing. By guiding fuzzers through the coverage information, seeds that generate new paths will be retained to continually increase the coverage. However, we observed that most samples follow the same few high-frequency paths. The seeds that exercise a high-frequency path are saved for the subsequent mutation process until the user terminates the test process, which directly affects the efficiency with which the low-frequency paths are tested. In this paper, we propose a fuzzing solution, ER-Fuzz, that truncates the recording of a high-frequency path to influence coverage. It utilizes a deep learning-based classifier to locate the high and low-frequency path transfer points; then, it instruments at the transfer position to promote the probability low-frequency transfer paths while eliminating subsequent variations of the high-frequency path seeds. We implemented a prototype of ER-Fuzz based on the popular fuzzer AFL and evaluated it on several applications. The experimental results show that ER-Fuzz improves the coverage of the original AFL method to different degrees. In terms of the number of crash discoveries, in the best case, ER-Fuzz found 115% more unique crashes than did AFL. In total, seven new bugs were found and new CVEs were assigned.

An Empirical Study of Security for API in Windows Systems (윈도우즈에서 제공되는 기본 API에 대한 안전성 고찰)

  • Choi, Young-Han;Kim, Hyoung-Chun;Oh, Hyung-Geun;Lee, Do-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.2
    • /
    • pp.75-82
    • /
    • 2009
  • In this paper, we test for security targeting on APIs of Windows as that is used by many people worldwide. In order to test APIs in DLL fils of Windows OS, we propose Automated Windows API Fuzz Testing(AWAFT) that can execute fuzz testing automatically and implemented the practical tool for AWAFT. AWAFT focuses on buffer overflows and parsing errors of function parameters. Using the tool, we found 177 errors in the system folder of Windows XP SP2. Therefore, AWAFT is useful for security testing of Windows APIs. AWAFT can be applied to libraries of third party software in Windows OS for the security.

The Status Quo and Future of Software Regression Bug Discovery via Fuzz Testing (퍼즈 테스팅을 통한 소프트웨어 회귀 버그 탐색 기법의 동향과 전망)

  • Lee, Gwangmu;Lee, Byoungyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.911-917
    • /
    • 2021
  • As software gets an increasing amount of patches, lots of software bugs are increasingly caused by such software patches, collectively known as regression bugs. To proactively detect the regressions bugs, both industry and academia are actively searching for a way to augment fuzz testing, one of the most popular automatic bug detection techniques. In this paper, we investigate the status quo of the studies on augmenting fuzz testing for regression bug detection and, based on the limitations of current proposals, provide an outlook of the relevant research.

Firmware Fuzzing Method through Pseudo-HAL Identification (유사 HAL 함수 탐색을 통한 펌웨어 퍼징 기법)

  • Jeong, Seyeon;Hwang, Eunbi;Cho, Yeongpil;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1121-1125
    • /
    • 2022
  • HAL-Fuzz, a fuzzing technique to find firmware vulnerabilities, is efficient by using the HAL function of the hardware abstraction layer provided by MCU vendors. However, it cannot handle most firmware that unused the exact HAL function. In this paper, we propose a new method for identifying pseudo-HAL functions to increase the fuzzing availability of HAL-Fuzz. In experiments, we identified not only the HAL but also the pseudo-HAL functions, implemented by the developer, and that fuzzing is possible.

Monitoring of Dust Concentration Generated during Peach Sorting Operations (복숭아 선별작업장의 미세먼지의 발생특성 모니터링)

  • Seo, Hyo-Jae;Seo, Il-Hwan
    • Journal of Bio-Environment Control
    • /
    • v.31 no.3
    • /
    • pp.237-245
    • /
    • 2022
  • Peach is a typical summer fruit which can be used for various food, processed food, and fragrance ingredients in Korea. Peach is also known as one of serious allergens which make difficulty for farm workers during peach sorting operations. After peach harvesting, it moves to the sorting operations for removing cover material, removing fuzz on peach surface, sorting by size, and packing. The air-samplers and optical particle counters were used to analyze the characteristics of fine dust generation by location and operation characteristics in the experimental peach farms. During removing peach fuzz, the dust concentrations were increased by 6.89 times on total suspended particulate (TSP), 2.13 times on PM-10 (particulate matter), and 1.30 times on PM-2.5 compared to non-working periods, respectively. During removing peach covering materials, the dust concentrations were increased by 3.14 times on TSP, 1.91 times on PM-10, and 1.43 times on PM-2.5 compared to non-working periods, respectively. This represents peach fuzz can be affected to farm workers during peach sorting operations.

Residue Patterns of Insecticide Flubendiamide by Varieties of Peaches (살충제 Flubendiamide의 복숭아 품종에 따른 잔류양상)

  • Kim, Hyo-Young;Hwang, Jeong-In;Lee, Eun-Hyang;Jeon, Young-Hwan;Kim, Ji-Hwan;Ahn, Ji-Woon;Park, Hyun-Ju;Chung, Chang-Kook;Kim, San-Yeong;Lee, Suk-Hee;Kim, Jang-Eok
    • Korean Journal of Environmental Agriculture
    • /
    • v.31 no.2
    • /
    • pp.152-156
    • /
    • 2012
  • BACKGROUND: This research has investigated the residue patterns of insecticide flubendiamide on three species of peaches with different surface forms, and the residue amounts of them when mixed with a spreader. METHODS AND RESULTS: Pesticide used for field application on peaches was 20% flubendiamide of suspension concentrate(SC) and was sprayed at a recommended rate. The residue amounts of flubendiamide in peach were analyzed by HPLC equipped with UV detector. After the observation with a microscope, the rank of fuzz amount on peach's surface was Kurakatawase, Wolmi in descending order and Cheonhong did not have any fuzz. The residue amounts of flubendiamide were 0.54 mg/kg for Kurakatawase, 0.43 mg/kg for Wolmi and 0.10 mg/kg for Cheonhong, respectively. When flubendiamide was used with a spreader, polyoxy ethylene methylpoly siloxane, the residue amount for Kurakatawase barely changed at 0.55 mg/kg regardless of mixing with a spreader, and at 0.53 mg/kg for Wolmi. In Cheonhong, the residue amount was 0.48 mg/kg, which increased by 4.8 times due to the use of a spreader. CONCLUSION: This result indicates that the residue amounts of flubendiamde were affected by the surface forms of peaches, and in the presence of a spreader the residue amount did not increase in fuzzy species, but was affected greatly for species without fuzz.

A Design of X-Band Tile Type Active Transmit/Receive Module (X 대역 타일형 능동 송수신 모듈 설계)

  • Ha, Jung-Hyen;Moon, Ju-Young;Lee, Ki-Won;Nam, Byung-Chang;Yun, Sang-Won
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.21 no.12
    • /
    • pp.1467-1474
    • /
    • 2010
  • A tile type active T/R(Transmit/Receive) module for X-band active array radar is demonstrated in this paper. Proposed tile type structure based on fuzz button solderless vertical interconnection shows wide band characteristic of about 30 % bandwidth in X-band with insertion loss of below 0.6 dB and input and output VSWR of less than 1.7. Moreover, the mismatching generally appeared in the vertical interconnection which shown wide band characteristic can also be minimized and, therefore, good gain flatness can be achieved.