Skip to main content

Showing 1–3 of 3 results for author: Hutzelmann, T

.
  1. A Real-Time Remote IDS Testbed for Connected Vehicles

    Authors: Valentin Zieglmeier, Severin Kacianka, Thomas Hutzelmann, Alexander Pretschner

    Abstract: Connected vehicles are becoming commonplace. A constant connection between vehicles and a central server enables new features and services. This added connectivity raises the likelihood of exposure to attackers and risks unauthorized access. A possible countermeasure to this issue are intrusion detection systems (IDS), which aim at detecting these intrusions during or after their occurrence. The p… ▽ More

    Submitted 16 January, 2019; v1 submitted 27 November, 2018; originally announced November 2018.

    Comments: Peer-reviewed version accepted for publication in the proceedings of the 34th ACM/SIGAPP Symposium On Applied Computing (SAC'19)

  2. arXiv:1803.04881  [pdf, ps, other

    cs.SE

    Reviewing KLEE's Sonar-Search Strategy in Context of Greybox Fuzzing

    Authors: Saahil Ognawala, Alexander Pretschner, Thomas Hutzelmann, Eirini Psallida, Ricardo Nales Amato

    Abstract: Automatic test-case generation techniques of symbolic execution and fuzzing are the most widely used methods to discover vulnerabilities in, both, academia and industry. However, both these methods suffer from fundamental drawbacks that stop them from achieving high path coverage that may, consequently, lead to discovering vulnerabilities at the numerical scale of static analysis. In this presenta… ▽ More

    Submitted 13 March, 2018; originally announced March 2018.

    Comments: To be presented at KLEE Workshop 2018, London

  3. Improving Function Coverage with Munch: A Hybrid Fuzzing and Directed Symbolic Execution Approach

    Authors: Saahil Ognawala, Thomas Hutzelmann, Eirini Psallida, Alexander Pretschner

    Abstract: Fuzzing and symbolic execution are popular techniques for finding vulnerabilities and generating test-cases for programs. Fuzzing, a blackbox method that mutates seed input values, is generally incapable of generating diverse inputs that exercise all paths in the program. Due to the path-explosion problem and dependence on SMT solvers, symbolic execution may also not achieve high path coverage. A… ▽ More

    Submitted 12 December, 2017; v1 submitted 26 November, 2017; originally announced November 2017.

    Comments: To appear at 33rd ACM/SIGAPP Symposium On Applied Computing (SAC). To be held from 9th to 13th April, 2018