7,704 research outputs found
FairFuzz: Targeting Rare Branches to Rapidly Increase Greybox Fuzz Testing Coverage
In recent years, fuzz testing has proven itself to be one of the most
effective techniques for finding correctness bugs and security vulnerabilities
in practice. One particular fuzz testing tool, American Fuzzy Lop or AFL, has
become popular thanks to its ease-of-use and bug-finding power. However, AFL
remains limited in the depth of program coverage it achieves, in particular
because it does not consider which parts of program inputs should not be
mutated in order to maintain deep program coverage. We propose an approach,
FairFuzz, that helps alleviate this limitation in two key steps. First,
FairFuzz automatically prioritizes inputs exercising rare parts of the program
under test. Second, it automatically adjusts the mutation of inputs so that the
mutated inputs are more likely to exercise these same rare parts of the
program. We conduct evaluation on real-world programs against state-of-the-art
versions of AFL, thoroughly repeating experiments to get good measures of
variability. We find that on certain benchmarks FairFuzz shows significant
coverage increases after 24 hours compared to state-of-the-art versions of AFL,
while on others it achieves high program coverage at a significantly faster
rate
Hierarchical Up/Down Routing Architecture for Ethernet backbones and campus networks
We describe a new layer two distributed and scalable routing architecture. It uses an automatic hierarchical node identifier assignment mechanism associated to the rapid spanning tree protocol. Enhanced up/down mechanisms are used to prohibit some turns at nodes to break cycles, instead of blocking links like the spannning tree protocol does. The protocol performance is similar or better than other turn prohibition algorithms recently proposed with lower complexity O(Nd) and better scalability. Simulations show that the fraction of prohibited turns over random networks is less than 0.2. The effect of root bridge election on the performance of the protocol is limited both in the random and regular networks studied. The use of hierarchical, tree-descriptive addresses simplifies the routing, and avoids the need of all nodes having a global knowleddge of the network topology. Routing frames through the hierarchical tree at very high speed is possible by progressive decoding of frame destination address, without routing tables or port address learning. Coexistence with standard bridges is achieved using combined devices: bridges that forward the frames having global destination MAC addresses as standard bridges and frames with local MAC frames with the proposed protocol.Publicad
Cooperative network-coding system for wireless sensor networks
Describes a cooperative network coding system for wireless sensor networks. In this paper, we propose two practical power) and bandwidth)efficient systems based on amplify)and)forward (AF) and decode)and)forward (DF) schemes to address the problem of information exchange via a relay. The key idea is to channel encode each source’s message by using a high)performance non)binary turbo code based on Partial Unit Memory (PUM) codes to enhance the bit)error)rate performance, then reduce the energy consumption and increase spectrum efficiency by using network coding (NC) to combine individual nodes’ messages at the relay before forwarding to the destination. Two simple and low complexity physical layer NC schemes are proposed based on combinations of received source messages at the relay. We also present the theoretical limits and numerical analysis of the proposed schemes. Simulation results under Additive White Gaussian Noise, confirm that the proposed schemes achieve significant bandwidth savings and fewer transmissions over the benchmark systems which do not resort to NC. Theoretical limits for capacity and Signal to Noise Ratio behaviour for the proposed schemes are derived. The paper also proposes a cooperative strategy that is useful when insufficient combined messages are received at a node to recover the desired source messages, thus enabling the system to retrieve all packets with significantly fewer retransmission request messages
Integration of post-quantum cryptography in the TLS protocol (LWE Option)
Dissertação de mestrado em Computer ScienceWith the possibility of quantum computers making an appearance, possibly capable of
breaking several well established and widespread crytposystems (especially those that
implement public key cryptography), necessity has arisen to create new cryptographic
algorithms which remain safe even against adversaries using quantum computers.
Several algorithms based on different mathematical problems have been proposed which
are considered to be hard to solve with quantum computers. In recent years, a new
lattice-based mathematical problem called Learning With Errors (and its variant Ring -
Learning With Errors) was introduced, and several cryptosystems based on this problem
were introduced, some of which are becoming practical enough to compete with traditional
schemes that have been used for decades.
The primary focus in this work is the implementation of two Ring - Learning With Errors
based schemes (one key exchange mechanism and one digital signature scheme) on the TLS
protocol via the OpenSSL library as a way of checking their overall viability in real-world
scenarios, by comparing them to classical schemes implementing the same functionalities.Com a possibilidade do surgimento dos primeiros computadores quânticos, possivelmente
capazes de quebrar muitos dos cripto-sistemas bem difundidos e considerados seguros,
tornou-se necessário tomar precauções com a criação de novas técnicas criptográficas que
visam manter as suas propriedades de segurança mesmo contra adversários que usem
computadores quânticos.
Existem já muitas propostas de algoritmos baseados em problemas matemáticos
distintos que sĂŁo considerados difĂceis de resolver recorrendo a computadores quânticos.
Recentemente, foi introduzido um novo problema baseado em reticulados denominado de
Learning With Errors (e a sua variante Ring - Learning With Errors), e consequentemente
foram propostos vários cripto-sistemas baseados nesse problema, alguns dos quais começam
já a ser utilizáveis ao ponto de poderem ser comparados com os esquemas clássicos usados
há décadas.
O foco principal neste trabalho é a implementação de dois esquemas baseados no problema
Ring - Learning With Errors (mais precisamente, um esquema de troca de chaves e uma
assinatura digital) no protocolo TLS através da sua integração no OpenSSL como forma de
verificar a sua viabilidade em contextos reais, comparando-os com esquemas clássicos que
implementem as mesmas funcionalidades
- …