skip to main content
research-article
Free Access

SAGE: Whitebox Fuzzing for Security Testing: SAGE has had a remarkable impact at Microsoft.

Published:11 January 2012Publication History
Skip Abstract Section

Abstract

Most ACM Queue readers might think of "program verification research" as mostly theoretical with little impact on the world at large. Think again. If you are reading these lines on a PC running some form of Windows (like 93-plus percent of PC users--that is, more than a billion people), then you have been affected by this line of work--without knowing it, which is precisely the way we want it to be.

References

  1. Bhansali, S., Chen, W., De Jong, S., Edwards, A., Drinic, M. 2006. Framework for instruction-leveltracing and analysis of programs. In Second International Conference on Virtual ExecutionEnvironments. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. de Moura, L., Bjorner, N. 2008. Z3: an efficient SMT solver. In Proceedings of TACAS (Tools andAlgorithms for the Construction and Analysis of Systems), volume 4963 of Lecture Notes in ComputerScience: 337-340. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Forrester, J. E., Miller, B. P. 2000. An empirical study of the robustness of Windows NT applicationsusing random testing. In Proceedings of the 4th Usenix Windows System Symposium, Seattle (August). Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Godefroid, P., Klarlund, N., Sen, K. 2005. DART: Directed Automated Random Testing. InProceedings of PLDI (Programming Language Design and Implementation): 213-223. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Godefroid, P., Levin, M. Y., Molnar, D. 2008. Automated whitebox fuzz testing. In Proceedings ofNDSS (Network and Distributed Systems Security): 151-166.Google ScholarGoogle Scholar
  6. Howard, M. 2007. Lessons learned from the animated cursor security bug; http://blogs.msdn.com/sdl/archive/2007/04/26/lessons-learned-fromthe-animated-cursor-security-bug.aspx.Google ScholarGoogle Scholar
  7. Howard, M., Lipner, S. 2006. The Security Development Lifecycle. Microsoft Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Narayanasamy, S.,Wang, Z., Tigani, J., Edwards, A., Calder, B. 2007. Automatically classifyingbenign and harmful data races using replay analysis. In Programming Languages Design andImplementation (PLDI). Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Sotirov, A. 2007. Windows animated cursor stack overflow vulnerability; http://www.determina.com/security.research/vulnerabilities/ani-header.html.Google ScholarGoogle Scholar

Index Terms

  1. SAGE: Whitebox Fuzzing for Security Testing: SAGE has had a remarkable impact at Microsoft.

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image Queue
          Queue  Volume 10, Issue 1
          Networks
          January 2012
          24 pages
          ISSN:1542-7730
          EISSN:1542-7749
          DOI:10.1145/2090147
          Issue’s Table of Contents

          Copyright © 2012 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 11 January 2012

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Popular
          • Editor picked

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format