Software implementations of communication protocols connect systems and services by allowing them to exchange data and information. The increasing request of secure connectivity and communication highlights the relevance of automated security testing techniques, such as fuzzing, to be applied during the software development. This paper provides the results of a retrospective analysis conducted on a rapid review about fuzz security testing for software implementations of communication protocols. By extending and generalizing the analysis documented in an existing work, this paper aims at collecting and presenting emerged evidences that: (a) characterize the target software implementations to be tested; (b) investigate what are the existing fuzzing testing techniques; and (c) explore which of them are supported by available tools. Our analysis, based on the examination of 80 scientific sources, conducted us to identify several evidences: (i) the existing fuzz techniques are mainly black-...
A Retrospective Analysis of a Rapid Review on Fuzz Security Testing for Software Implementation of Communication Protocols / Marchetto, Alessandro. - In: SN COMPUTER SCIENCE. - ISSN 2661-8907. - 5:7(2024), p. 883. [10.1007/s42979-024-03234-0]
A Retrospective Analysis of a Rapid Review on Fuzz Security Testing for Software Implementation of Communication Protocols
Marchetto, Alessandro
2024-01-01
Abstract
Software implementations of communication protocols connect systems and services by allowing them to exchange data and information. The increasing request of secure connectivity and communication highlights the relevance of automated security testing techniques, such as fuzzing, to be applied during the software development. This paper provides the results of a retrospective analysis conducted on a rapid review about fuzz security testing for software implementations of communication protocols. By extending and generalizing the analysis documented in an existing work, this paper aims at collecting and presenting emerged evidences that: (a) characterize the target software implementations to be tested; (b) investigate what are the existing fuzzing testing techniques; and (c) explore which of them are supported by available tools. Our analysis, based on the examination of 80 scientific sources, conducted us to identify several evidences: (i) the existing fuzz techniques are mainly black-...| File | Dimensione | Formato | |
|---|---|---|---|
|
0e9f48c3-78a7-4761-8482-aec06922c613.pdf
Solo gestori archivio
Tipologia:
Versione editoriale (Publisher’s layout)
Licenza:
Tutti i diritti riservati (All rights reserved)
Dimensione
1.98 MB
Formato
Adobe PDF
|
1.98 MB | Adobe PDF | Visualizza/Apri |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione



