scispace - formally typeset
Journal ArticleDOI

An empirical study of the reliability of UNIX utilities

Reads0
Chats0
TLDR
The following section describes the tools built to test the utilities, including the fuzz (random character) generator, ptyjig (to test interactive utilities), and scripts to automate the testing process.
Abstract
The following section describes the tools we built to test the utilities. These tools include the fuzz (random character) generator, ptyjig (to test interactive utilities), and scripts to automate the testing process. Next, we will describe the tests we performed, giving the types of input we presented to the utilities. Results from the tests will follow along with an analysis of the results, including identification and classification of the program bugs that caused the crashes. The final section presents concluding remarks, including suggestions for avoiding the types of problems detected by our study and some commentary on the bugs we found. We include an Appendix with the user manual pages for fuzz and ptyjig.

read more

Content maybe subject to copyright    Report

Citations
More filters
Dissertation

Automatic non-functional testing and tuning of configurable generators

TL;DR: This thesis leverages the metamorphic testing approach to detect non-functional inconsistencies in code generator families by defining meetamorphic relations as test oracles, and demonstrates that the approach can be used to automatically construct optimization levels that represent optimal trade-offs between multiple non- functional properties such as execution time and resource usage requirements.
Proceedings Article

Insecure context switching: inoculating regular expressions for survivability

TL;DR: Through the course of this research, a number of critical vulnerabilities were uncovered that traverse operating systems and applications including Adobe Flash, Apple Safari, Perl, GnuPG, and ICU.
Proceedings ArticleDOI

A Flexible Framework for Expediting Bug Finding by Leveraging Past (Mis-)Behavior to Discover New Bugs

TL;DR: This work introduces a framework that incorporates a tighter feedback loop to guide the fuzzing process in exploring truly diverse code paths, and presents an approach for assessing and selecting the hardware events that can be used as a meaningful coverage metric for a target program.
Proceedings ArticleDOI

A model guided security vulnerability discovery approach for network protocol implementation

TL;DR: The results show that Styx can effectively be used to discover security vulnerabilities from network protocol implementations, and provides a synthesized protocol security testing.
Proceedings ArticleDOI

RUGRAT: Runtime Test Case Generation Using Dynamic Compilers

TL;DR: This work presents RUGRAT, a novel technique to automatically generate tests to exercise code designed to handle uncommon situations during program execution, which is independent of the source language, requires no modification to the source orbinary program under test and generates runtime tests automatically based on a simple test specification.
References
More filters
Journal ArticleDOI

On the criteria to be used in decomposing systems into modules

TL;DR: In this paper, the authors discuss modularization as a mechanism for improving the flexibility and comprehensibility of a system while allowing the shortening of its development time, and the effectiveness of modularization is dependent upon the criteria used in dividing the system into modules.
Journal ArticleDOI

Letters to the editor: go to statement considered harmful

TL;DR: My considerations are that, although the programmer's activity ends when he has constructed a correct program, the process taking place under control of his program is the true subject matter of his activity, and that his intellectual powers are rather geared to master static relations and his powers to visualize processes evolving in time are relatively poorly developed.
Book

Go to statement considered harmful

TL;DR: In form and content, Dijkstra's letter is similar to his 1965 paper, and the last few paragraphs underscore once again why the subject of structured programming stayed out of the mainstream of the data processing industry for so long.
Journal ArticleDOI

Efficient learning of context-free grammars from positive structural examples

TL;DR: It is shown that the class of reversible context-free grammars can be identified in the limit frompositive samples of structural descriptions and there exists an efficient algorithm to identify them from positive samples ofStructural descriptions, where a structural description of a context- free grammar is an unlabelled derivation tree of the grammar.
Journal ArticleDOI

Crisis and aftermath

TL;DR: Last November the Internet was infected with a worm program that eventually spread to thousands of machines, disrupting normal activities and Internet connectivity for many days.