A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
On Designing an Efficient Distributed Black-Box Fuzzing System for Mobile Devices
2015
Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security - ASIA CCS '15
Security researchers who jailbreak iOS devices have usually crowdsourced for system level vulnerabilities [1] for iOS. However, their success has depended on whether a particular device owner encountered a crash in system-level code. To conduct voluntary security testing, black-box fuzzing is one of the ideal low-cost and simple techniques to find system level vulnerabilities for the less technical crowd. However, it is not the most effective method due to the large fuzzing space. At the same
doi:10.1145/2714576.2714607
dblp:conf/ccs/HaoRK15
fatcat:uygurjg6fnaizjnocg3wavzupm