Academic literature on the topic 'Model fuzzing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Model fuzzing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Model fuzzing"

1

Zhu, Xue Yong, and Zhi Yong Wu. "A New Fuzzing Technique Using Niche Genetic Algorithm." Advanced Materials Research 756-759 (September 2013): 4050–58. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.4050.

Full text
Abstract:
Current advanced Fuzzing technique can only implement vulnerability mining on a single vulnerable statement each time, and this paper proposes a new multi-dimension Fuzzing technique, which uses niche genetic algorithm to generate test cases and can concurrently approach double vulnerable targets with the minimum cost on the two vulnerable statements each time. For that purpose, a corresponding mathematical model and the minimum cost theorem are presented. The results of the experiment show that the efficiency of the new proposed Fuzzing technique is much better than current advanced Fuzzing techniques.
APA, Harvard, Vancouver, ISO, and other styles
2

Kim, Minho, Seongbin Park, Jino Yoon, Minsoo Kim, and Bong-Nam Noh. "File Analysis Data Auto-Creation Model For Peach Fuzzing." Journal of the Korea Institute of Information Security and Cryptology 24, no. 2 (April 30, 2014): 327–33. http://dx.doi.org/10.13089/jkiisc.2014.24.2.327.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Song, Guang Jun, Chun Lan Zhao, and Ming Li. "Study on Software Vulnerability Dynamic Discovering System." Applied Mechanics and Materials 151 (January 2012): 673–77. http://dx.doi.org/10.4028/www.scientific.net/amm.151.673.

Full text
Abstract:
Developed a new system model of software vulnerability discovering, which was based on fuzzing, feature matching of API sequences and data mining. Overcame the disadvantages of old techniques, this new method effectively improves the detection of potential unknown security vulnerabilities in software. Besides, this method is more automated and performs better in finding new security vulnerabilities.
APA, Harvard, Vancouver, ISO, and other styles
4

Guan, Quan Long, Guo Xiang Yao, Kai Bin Ni, and Mei Xiu Zhou. "Research on Fuzzing Test Data Engine for Web Vulnerability." Advanced Materials Research 211-212 (February 2011): 500–504. http://dx.doi.org/10.4028/www.scientific.net/amr.211-212.500.

Full text
Abstract:
With the rapid growth of e-commerce, various types of complex applications appear in web environments. web-based system testing is different from traditional software testing. The unpredictability of Internet and web systems makes it difficult to test web-based system. This paper presents an engine for Fuzzing test data towards web control vulnerabilities, and introduces "heuristic rules" and "tagged words" to generate the test data. This method can increase the intelligence of security testing and build the foundation of web vulnerability detection model.
APA, Harvard, Vancouver, ISO, and other styles
5

Zeng, Yingpei, Mingmin Lin, Shanqing Guo, Yanzhao Shen, Tingting Cui, Ting Wu, Qiuhua Zheng, and Qiuhua Wang. "MultiFuzz: A Coverage-Based Multiparty-Protocol Fuzzer for IoT Publish/Subscribe Protocols." Sensors 20, no. 18 (September 11, 2020): 5194. http://dx.doi.org/10.3390/s20185194.

Full text
Abstract:
The publish/subscribe model has gained prominence in the Internet of things (IoT) network, and both Message Queue Telemetry Transport (MQTT) and Constrained Application Protocol (CoAP) support it. However, existing coverage-based fuzzers may miss some paths when fuzzing such publish/subscribe protocols, because they implicitly assume that there are only two parties in a protocol, which is not true now since there are three parties, i.e., the publisher, the subscriber and the broker. In this paper, we propose MultiFuzz, a new coverage-based multiparty-protocol fuzzer. First, it embeds multiple-connection information in a single input. Second, it uses a message mutation algorithm to stimulate protocol state transitions, without the need of protocol specifications. Third, it uses a new desockmulti module to feed the network messages into the program under test. desockmulti is similar to desock (Preeny), a tool widely used by the community, but it is specially designed for fuzzing and is 10x faster. We implement MultiFuzz based on AFL, and use it to fuzz two popular projects Eclipse Mosquitto and libCoAP. We reported discovered problems to the projects. In addition, we compare MultiFuzz with AFL and two state-of-the-art fuzzers, MOPT and AFLNET, and find it discovering more paths and crashes.
APA, Harvard, Vancouver, ISO, and other styles
6

Gao, Sudi, Yueying Luo, and Tan Yang. "Research on River Water Environmental Capacity Based on Triangular Fuzzy Technology." E3S Web of Conferences 236 (2021): 03018. http://dx.doi.org/10.1051/e3sconf/202123603018.

Full text
Abstract:
Based on the randomness and ambiguity characteristics of the river water environment system, as well as the lack and inaccuracy of data information, the water environment system parameters are defined as triangular fuzzy numbers. On this basis, by fuzzing the parameters of the conventional deterministic model, a fuzzy model for calculating river water environmental capacity is established. According to this model, the river water environment capacity in the form of triangular fuzzy numbers can be calculated. According to the requirements of a given level of credibility, the water environment capacity can be further converted from triangular fuzzy numbers to interval values. Research shows that compared with conventional deterministic methods, the results obtained are more scientific and reasonable
APA, Harvard, Vancouver, ISO, and other styles
7

Dong, Guofang, Pu Sun, Wenbo Shi, and Chang Choi. "A novel valuation pruning optimization fuzzing test model based on mutation tree for industrial control systems." Applied Soft Computing 70 (September 2018): 896–902. http://dx.doi.org/10.1016/j.asoc.2018.02.036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dai, Xinghua, Shengrong Gong, Shan Zhong, and Zongming Bao. "Bilinear CNN Model for Fine-Grained Classification Based on Subcategory-Similarity Measurement." Applied Sciences 9, no. 2 (January 16, 2019): 301. http://dx.doi.org/10.3390/app9020301.

Full text
Abstract:
One of the challenges in fine-grained classification is that subcategories with significant similarity are hard to be distinguished due to the equal treatment of all subcategories in existing algorithms. In order to solve this problem, a fine-grained image classification method by combining a bilinear convolutional neural network (B-CNN) and the measurement of subcategory similarities is proposed. Firstly, an improved weakly supervised localization method is designed to obtain the bounding box of the main object, which allows the model to eliminate the influence of background noise and obtain more accurate features. Then, sample features in the training set are computed by B-CNN so that the fuzzing similarity matrix for measuring interclass similarities can be obtained. To further improve classification accuracy, the loss function is designed by weighting triplet loss and softmax loss. Extensive experiments implemented on two benchmarks datasets, Stanford Cars-196 and Caltech-UCSD Birds-200-2011 (CUB-200-2011), show that the newly proposed method outperforms in accuracy several state-of-the-art weakly supervised classification models.
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Xiandong, Jianmin He, and Shouwei Li. "Compound Option Pricing under Fuzzy Environment." Journal of Applied Mathematics 2014 (2014): 1–9. http://dx.doi.org/10.1155/2014/875319.

Full text
Abstract:
Considering the uncertainty of a financial market includes two aspects: risk and vagueness; in this paper, fuzzy sets theory is applied to model the imprecise input parameters (interest rate and volatility). We present the fuzzy price of compound option by fuzzing the interest and volatility in Geske’s compound option pricing formula. For eachα, theα-level set of fuzzy prices is obtained according to the fuzzy arithmetics and the definition of fuzzy-valued function. We apply a defuzzification method based on crisp possibilistic mean values of the fuzzy interest rate and fuzzy volatility to obtain the crisp possibilistic mean value of compound option price. Finally, we present a numerical analysis to illustrate the compound option pricing under fuzzy environment.
APA, Harvard, Vancouver, ISO, and other styles
10

Liu, Xiao, Xiaoting Li, Rupesh Prajapati, and Dinghao Wu. "DeepFuzz: Automatic Generation of Syntax Valid C Programs for Fuzz Testing." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 1044–51. http://dx.doi.org/10.1609/aaai.v33i01.33011044.

Full text
Abstract:
Compilers are among the most fundamental programming tools for building software. However, production compilers remain buggy. Fuzz testing is often leveraged with newlygenerated, or mutated inputs in order to find new bugs or security vulnerabilities. In this paper, we propose a grammarbased fuzzing tool called DEEPFUZZ. Based on a generative Sequence-to-Sequence model, DEEPFUZZ automatically and continuously generates well-formed C programs. We use this set of new C programs to fuzz off-the-shelf C compilers, e.g., GCC and Clang/LLVM. We present a detailed case study to analyze the success rate and coverage improvement of the generated C programs for fuzz testing. We analyze the performance of DEEPFUZZ with three types of sampling methods as well as three types of generation strategies. Consequently, DEEPFUZZ improved the testing efficacy in regards to the line, function, and branch coverage. In our preliminary study, we found and reported 8 bugs of GCC, all of which are actively being addressed by developers.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Model fuzzing"

1

Duchene, Fabien. "Detection of web vulnerabilities via model inference assisted evolutionary fuzzing." Thesis, Grenoble, 2014. http://www.theses.fr/2014GRENM022/document.

Full text
Abstract:
Le test est une approche efficace pour détecter des bogues d'implémentation ayant un impact sur la sécurité, c.a.d. des vulnérabilités. Lorsque le code source n'est pas disponible, il est nécessaire d'utiliser des techniques de test en boîte noire. Nous nous intéressons au problème de détection automatique d'une classe de vulnérabilités (Cross Site Scripting alias XSS) dans les applications web dans un contexte de test en boîte noire. Nous proposons une approche pour inférer des modèles de telles applications et frelatons des séquences d'entrées générées à partir de ces modèles et d'une grammaire d'attaque. Nous inférons des automates de contrôle et de teinte, dont nous extrayons des sous-modèles afin de réduire l'espace de recherche de l'étape de frelatage. Nous utilisons des algorithmes génétiques pour guider la production d'entrées malicieuses envoyées à l'application. Nous produisons un verdict de test grâce à une double inférence de teinte sur l'arbre d'analyse grammaticale d'un navigateur et à l'utilisation de motifs de vulnérabilités comportant des annotations de teinte. Nos implémentations LigRE et KameleonFuzz obtiennent de meilleurs résultats que les scanneurs boîte noire open-source. Nous avons découvert des XSS ``0-day'' (c.a.d. des vulnérabilités jusque lors inconnues publiquement) dans des applications web utilisées par des millions d'utilisateurs
Testing is a viable approach for detecting implementation bugs which have a security impact, a.k.a. vulnerabilities. When the source code is not available, it is necessary to use black-box testing techniques. We address the problem of automatically detecting a certain class of vulnerabilities (Cross Site Scripting a.k.a. XSS) in web applications in a black-box test context. We propose an approach for inferring models of web applications and fuzzing from such models and an attack grammar. We infer control plus taint flow automata, from which we produce slices, which narrow the fuzzing search space. Genetic algorithms are then used to schedule the malicious inputs which are sent to the application. We incorporate a test verdict by performing a double taint inference on the browser parse tree and combining this with taint aware vulnerability patterns. Our implementations LigRE and KameleonFuzz outperform current open-source black-box scanners. We discovered 0-day XSS (i.e., previously unknown vulnerabilities) in web applications used by millions of users
APA, Harvard, Vancouver, ISO, and other styles
2

Venger, Adam. "Black-box analýza zabezpečení Wi-Fi." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445533.

Full text
Abstract:
Zariadenia, na ktoré sa každodenne spoliehame, sú stále zložitejšie a využívajú zložitejšie protokoly. Jedným z týchto protokolov je Wi-Fi. S rastúcou zložitosťou sa zvyšuje aj potenciál pre implementačné chyby. Táto práca skúma Wi-Fi protokol a použitie fuzz testingu pre generovanie semi-validných vstupov, ktoré by mohli odhaliť zraniteľné miesta v zariadeniach. Špeciálna pozornosť bola venovaná testovaniu Wi-Fi v systéme ESP32 a ESP32-S2. Výsledkom práce je fuzzer vhodný pre testovanie akéhokoľvek Wi-Fi zariadenia, monitorovací nástroj špeciálne pre ESP32 a sada testovacích programov pre ESP32. Nástroj neodhalil žiadne potenciálne zraniteľnosti.
APA, Harvard, Vancouver, ISO, and other styles
3

Ahmad, Abbas. "Model-Based Testing for IoT Systems : Methods and tools." Thesis, Bourgogne Franche-Comté, 2018. http://www.theses.fr/2018UBFCD008/document.

Full text
Abstract:
L'internet des objets (IoT) est aujourd'hui un moyen d'innovation et de transformation pour de nombreuses entreprises. Les applications s'étendent à un grand nombre de domaines, tels que les villes intelligentes, les maisons intelligentes, la santé, etc. Le Groupe Gartner estime à 21 milliards le nombre d'objets connectés d'ici 2020. Le grand nombre d'objets connectés introduit des problèmes, tels que la conformité et l'interopérabilité en raison de l'hétérogénéité des protocoles de communication et de l'absence d'une norme mondialement acceptée. Le grand nombre d'utilisations introduit des problèmes de déploiement sécurisé et d'évolution du réseau des IoT pour former des infrastructures de grande taille. Cette thèse aborde la problématique de la validation de l'internet des objets pour répondre aux défis des systèmes IoT. Pour cela, nous proposons une approche utilisant la génération de tests à partir de modèles (MBT). Nous avons confronté cette approche à travers de multiples expérimentations utilisant des systèmes réels grâce à notre participation à des projets internationaux. L'effort important qui doit être fait sur les aspects du test rappelle à tout développeur de système IoT que: ne rien faire est plus cher que de faire au fur et à mesure
The Internet of Things (IoT) is nowadays globally a mean of innovation and transformation for many companies. Applications extend to a large number of domains, such as smart cities, smart homes, healthcare, etc. The Gartner Group estimates an increase up to 21 billion connected things by 2020. The large span of "things" introduces problematic aspects, such as conformance and interoperability due to the heterogeneity of communication protocols and the lack of a globally-accepted standard. The large span of usages introduces problems regarding secure deployments and scalability of the network over large-scale infrastructures. This thesis deals with the problem of the validation of the Internet of Things to meet the challenges of IoT systems. For that, we propose an approach using the generation of tests from models (MBT). We have confronted this approach through multiple experiments using real systems thanks to our participation in international projects. The important effort which is needed to be placed on the testing aspects reminds every IoT system developer that doing nothing is more expensive later on than doing it on the go
APA, Harvard, Vancouver, ISO, and other styles
4

Lone, Sang Fernand. "Protection des systèmes informatiques contre les attaques par entrées-sorties." Phd thesis, INSA de Toulouse, 2012. http://tel.archives-ouvertes.fr/tel-00863020.

Full text
Abstract:
Les attaques ciblant les systèmes informatiques vont aujourd'hui au delà de simples logiciels malveillants et impliquent de plus en plus des composants matériels. Cette thèse s'intéresse à cette nouvelle classe d'attaques et traite, plus précisément, des attaques par entrées-sorties qui détournent des fonctionnalités légitimes du matériel, tels que les mécanismes entrées-sorties, à différentes fins malveillantes. L'objectif est d'étudier ces attaques, qui sont extrêmement difficiles à détecter par des techniques logicielles classiques (dans la mesure où leur mise en oeuvre ne nécessite pas l'intervention des processeurs) afin de proposer des contre-mesures adaptées, basées sur des composants matériels fiables et incontournables. Ce manuscrit se concentre sur deux cas : celui des composants matériels qui peuvent être délibérément conçus pour être malveillants et agissants de la même façon qu'un programme intégrant un cheval de Troie ; et celui des composants matériels vulnérables qui ont été modifiés par un pirate informatique, localement ou au travers du réseau, afin d'y intégrer des fonctions malveillantes (typiquement, une porte dérobée dans son firmware). Pour identifier les attaques par entrées-sorties, nous avons commencé par élaborer un modèle d'attaques qui tient compte des différents niveaux d'abstraction d'un système informatique. Nous nous sommes ensuite appuyés sur ce modèle d'attaques pour les étudier selon deux approches complémentaires : une analyse de vulnérabilités traditionnelle, consistant à identifier une vulnérabilité, développer des preuves de concept et proposer des contre-mesures ; et une analyse de vulnérabilités par fuzzing sur les bus d'entrées-sorties, reposant sur un outil d'injection de fautes que nous avons conçu, baptisé IronHide, capable de simuler des attaques depuis un composant matériel malveillant. Les résultats obtenus pour chacunes de ces approches sont discutés et quelques contre-mesures aux vulnérabilités identifiées, basées sur des composants matériels existants, sont proposées.
APA, Harvard, Vancouver, ISO, and other styles
5

Liao, Feng-Ze, and 廖峰澤. "Browser Fuzzing by Scheduled Mutation and Generation of Document Object Models." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/34522736060995439796.

Full text
Abstract:
碩士
國立交通大學
網路工程研究所
103
Internet applications have made our daily life fruitful. However, they also cause many security problems if these applications are leveraged by intruders. Thus, it is important to find and fix vulnerabilities timely to prevent application vulnerabilities from being exploited. Fuzz testing is a popular methodology that effectively finds vulnerabilities in application programs with seed input mutation. However, it is not a satisfied solution for the web browsers. In this work, we propose a solution, called scheduled DOM fuzzing (SDF), which integrates several related browser fuzzing tools and the fuzzing framework called BFF. To explore more crash possibilities, we revise the browser fuzzing architecture and schedule seed input selection and mutation dynamically. We also propose two probability computing methods in scheduling mechanism which tries to improve the performance by determining which combinations of seed and mutation would produce more crashes. Our experiments show that SDF is 2.27 time more efficient in terms of the number of crashes and vulnerabilities found at most. SDF also has the capacity for finding 23 exploitable crashes in Windows 7 within five days. The experimental results reveals that a good scheduling method for seed and mutations in browser fuzzing is able to find more exploitable crashes than fuzzers with the fixed seed input.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Model fuzzing"

1

Wikert, Steven Micheal. Cherish me always: Teddy bears & warm fuzzies : antique photographs of children with stuffed animals. Grantsville, Md: Hobby House Press, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wikert, Steven Micheal, and Mary McMurray Wikert. Teddy Bears & Warm Fuzzies: Antique Photographs of Children with Stuffed Animals. Hobby House Press, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Model fuzzing"

1

Chen, Chen, Zhouguo Chen, Yongle Hao, and Baojiang Cui. "Mocov: Model Based Fuzzing Through Coverage Guided Technology." In Advances on Broad-Band Wireless Computing, Communication and Applications, 404–13. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-69811-3_37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Widl, Magdalena. "Test Case Generation by Grammar-Based Fuzzing for Model-Driven Engineering." In Hardware and Software: Verification and Testing, 278–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39611-3_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chen, Yixiong, Yang Yang, Zhanyao Lei, Mingyuan Xia, and Zhengwei Qi. "Bootstrapping Automated Testing for RESTful Web Services." In Fundamental Approaches to Software Engineering, 46–66. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71500-7_3.

Full text
Abstract:
AbstractModern RESTful services expose RESTful APIs to integrate with diversified applications. Most RESTful API parameters are weakly typed, which greatly increases the possible input value space. This poses difficulties for automated testing tools to generate effective test cases to reveal web service defects related to parameter validation. We call this phenomenon the type collapse problem. To remedy this problem, we introduce FET (Format-encoded Type) techniques, including the FET, the FET lattice, and the FET inference to model fine-grained information for API parameters. Enhanced by FET techniques, automated testing tools can generate targeted test cases. We demonstrate Leif, a trace-driven fuzzing tool, as a proof-of-concept implementation of FET techniques. Experiment results on 27 commercial services show that FET inference precisely captures documented parameter definitions, which helps Leif to discover 11 new bugs and reduce $$72\% \sim 86\%$$ 72 % ∼ 86 % fuzzing time as compared to state-of-the-art fuzzers.
APA, Harvard, Vancouver, ISO, and other styles
4

Alshmrany, Kaled M., Rafael S. Menezes, Mikhail R. Gadelha, and Lucas C. Cordeiro. "FuSeBMC: A White-Box Fuzzer for Finding Security Vulnerabilities in C Programs (Competition Contribution)." In Fundamental Approaches to Software Engineering, 363–67. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71500-7_19.

Full text
Abstract:
AbstractWe describe and evaluate a novel white-box fuzzer for C programs named , which combines fuzzing and symbolic execution, and applies Bounded Model Checking (BMC) to find security vulnerabilities in C programs. explores and analyzes C programs (1) to find execution paths that lead to property violations and (2) to incrementally inject labels to guide the fuzzer and the BMC engine to produce test-cases for code coverage. successfully participates in Test-Comp’21 and achieves first place in the category and second place in the category.
APA, Harvard, Vancouver, ISO, and other styles
5

Idowu, Peter Adebayo, Sarumi Olusegun Ajibola, Jeremiah Ademola Balogun, and Oluwadare Ogunlade. "Development of a Fuzzy Logic-Based Model for Monitoring Cardiovascular Risk." In Coronary and Cardiothoracic Critical Care, 172–90. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8185-7.ch009.

Full text
Abstract:
Cardiovascular diseases (CVD) are top killers with heart failure as one of the most leading cause of death in both developed and developing countries. In Nigeria, the inability to consistently monitor the vital signs of patients has led to the hospitalization and untimely death of many as a result of heart failure. Fuzzy logic models have found relevance in healthcare services due to their ability to measure vagueness associated with uncertainty management in intelligent systems. This study aims to develop a fuzzy logic model for monitoring heart failure risk using risk indicators assessed from patients. Following interview with expert cardiologists, the different stages of heart failure was identified alongside their respective indicators. Triangular membership functions were used to fuzzify the input and output variables while the fuzzy inference engine was developed using rules elicited from cardiologists. The model was simulated using the MATLAB® Fuzzy Logic Toolbox.
APA, Harvard, Vancouver, ISO, and other styles
6

Jaggi, Chandra K., Bimal Kumar Mishra, and T. C. Panda. "A Fuzzy EOQ Model for Deteriorating Items With Allowable Shortage and Inspection Under the Trade Credit." In Handbook of Research on Promoting Business Process Improvement Through Inventory Control Techniques, 233–49. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-3232-3.ch014.

Full text
Abstract:
This chapter develops an economic order quantity model for deteriorating items with initial inspection, allowable shortage under the condition of permissible delay in payment by fuzzify the demand rate, deterioration rate and inspection parameter of non-defective parameter based on as triangular fuzzy numbers to fit the real word. The total fuzzy cost function has been defuzzified using signed distance and centroid method. Comparison between these two methods has also been discussed. The validity of the model has been established with the help of a hypothetical numerical example.
APA, Harvard, Vancouver, ISO, and other styles
7

Chakraborti, Debjani, Valentina E. Balas, and Bijay Baran Pal. "Genetic Algorithm for FGP Model of a Multiobjective Bilevel Programming Problem in Uncertain Environment." In Handbook of Research on Natural Computing for Optimization Problems, 870–88. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-5225-0058-2.ch035.

Full text
Abstract:
This chapter describes a Genetic Algorithm (GA) based Fuzzy Goal Programming (FGP) model to solve a Multiobjective Bilevel Programming Problem (MOBLPP) with a set of chance constraints within a structure of decentralized decision problems. To formulate the model, the chance constraints are converted first to their crisp equivalents to employ FGP methodology. Then, the tolerance membership functions associated with fuzzily described goals of the objective functions are defined to measure the degree of satisfaction of Decision Makers (DMs) with achievement of objective function values and also to obtain the degree of optimality of vector of decision variables controlled by upper-level DM in the decision system. In decision-making process, a GA scheme is adopted to solve the problem and thereby to obtain a proper solution for balancing execution powers of DMs in uncertain environment. A numerical example is provided to illustrate the method.
APA, Harvard, Vancouver, ISO, and other styles
8

Kumar, Mousumi, Valentina E. Balas, and Bijay Baran Pal. "Using Fuzzy Goal Programming with Penalty Functions for Solving EEPGD Problem via Genetic Algorithm." In Handbook of Research on Natural Computing for Optimization Problems, 847–69. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-5225-0058-2.ch034.

Full text
Abstract:
This chapter presents how the concept of penalty functions is incorporated within the framework of Fuzzy Goal Programming (FGP) for modelling and solving Economic-Environmental Power Generation and Dispatch (EEPGD) problems by employing genetic algorithms. In model formulation, first penalty functions to measuring membership values of defined fuzzy goals are presented. Then, minsum FGP method is used to obtain rank based solution in imprecise environment. In the process of solving the problem, a GA scheme is implemented at two different stages. At the first stage, optimal solutions of objective functions are determined for fuzzy representation of each of them. At the second stage, evaluation of achievement function to arrive at the highest membership value of fuzzily described objective goals is taken into account. The standard IEEE 6-Generator 30-Bus test system is considered to illustrate the approach. A comparison of model solution with the solutions of conventional approaches is also made to highlight the potential use of the approach.
APA, Harvard, Vancouver, ISO, and other styles
9

Saha, Sumana, and Tripti Chakrabarti. "Imprecise Inventory Model for Items With Imperfect Quality Subject to Learning Effects Having Shortages." In Handbook of Research on Promoting Business Process Improvement Through Inventory Control Techniques, 284–304. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-3232-3.ch016.

Full text
Abstract:
The fundamental assumption of an economic order quantity (EOQ) model is that 100% of items in an ordered lot are perfect. This assumption is not always pertinent for production processes because of process deterioration or other factors. This paper develops an EOQ model for that each ordered lot contains some defective items and shortages backordered. Here, an inventory model is developed to deal the impreciseness present in market demand. It is assumed that the received items are not of perfect quality and after screening, imperfect items are withdrawn from inventory and sold at discounted price. However, in practice, errors occur in screening test. So, the screening process fails to be perfect. Due to acquaintance with handling methodology and system, holding cost and ordering cost are gradually decreases from one shipment to another. So, learning effect is incorporated on holding cost, ordering cost and number of defective items present in each lot. Due to impreciseness in market demand and in different inventory costs, profit expression is fuzzy in nature. To fuzzify the profit expression, Extension Principle is used and for defuzzification Signed distance method is applied. Finally, the feasibility of proposed model and the effect of learning on optimal solution are shown through numerical example.
APA, Harvard, Vancouver, ISO, and other styles
10

"Development of Fuzzy Multi-Objective Stochastic Fractional Programming Models." In Multi-Objective Stochastic Programming in Fuzzy Environments, 128–76. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8301-1.ch004.

Full text
Abstract:
In this chapter, two methodologies for solving multi-objective linear fractional stochastic programming problems containing fuzzy numbers (FNs) and fuzzy random variables (FRVs) associated with the system constraints are developed. In the model formulation process, the fuzzy probabilistic constraints are converted into equivalent fuzzy constraints by applying chance constrained programming (CCP) technique in a fuzzily defined probabilistic decision-making situation. Then two techniques, -cut and defuzzification methods, are used to convert the model into the corresponding deterministic model. In the method of using -cut for FNs, the tolerance level of FNs is considered, and the constraints are reduced to constraints with interval coefficients. Alternatively, in using defuzzification method, FNs are replaced by their defuzzified values. Consequently, the constraints are modified into constraints in deterministic form. In the next step, the constraints with interval coefficients are customized into its equivalent form by using the convex combination of each interval. If the parameters of the objectives are triangular FNs, then on the basis of their tolerance ranges each objective is decomposed into three objectives with crisp coefficients. Then each objective is solved independently to find their best and worst values and those values are used to construct membership function of each objective. Finally, the compromise solution of multi-objective linear fractional CCP problems is obtained by applying any of the approaches: priority-based fuzzy goal programming (FGP) method, Zimmermann's approach, -connective process, or minimum bounded sum operator technique. To demonstrate the efficiency of the above-described techniques, two illustrative examples, studied previously, are solved, and the solutions are compared with the existing methodology.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Model fuzzing"

1

Schneider, Martin, Jurgen Grossmann, Ina Schieferdecker, and Andrej Pietschker. "Online Model-Based Behavioral Fuzzing." In 2013 IEEE 6th International Conference On Software Testing, Verification and Validation Workshops (ICSTW). IEEE, 2013. http://dx.doi.org/10.1109/icstw.2013.61.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Jiajie, Puhan Zhang, Lei Zhang, Haowen Zhu, and Xiaojun Ye. "A model-based fuzzing approach for DBMS." In 2013 8th International Conference on Communications and Networking in China (CHINACOM). IEEE, 2013. http://dx.doi.org/10.1109/chinacom.2013.6694634.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pham, Van-Thuan, Marcel Böhme, and Abhik Roychoudhury. "Model-based whitebox fuzzing for program binaries." In ASE'16: ACM/IEEE International Conference on Automated Software Engineering. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2970276.2970316.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gao, Zicong, Weiyu Dong, Rui Chang, and Chengwei Ai. "The Stacked Seq2seq-attention Model for Protocol Fuzzing." In 2019 IEEE 7th International Conference on Computer Science and Network Technology (ICCSNT). IEEE, 2019. http://dx.doi.org/10.1109/iccsnt47585.2019.8962499.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

He, HuiHui, and YongJun Wang. "PNFUZZ: A Stateful Network Protocol Fuzzing Approach Based on Packet Clustering." In 6th International Conference on Computer Science, Engineering And Applications (CSEA 2020). AIRCC Publishing Corporation, 2020. http://dx.doi.org/10.5121/csit.2020.101805.

Full text
Abstract:
Due to the interactivity of stateful network protocol, network protocol fuzzing has higher blindness and lower testcase validity. The existing blackbox-based fuzzing has the disadvantages of high randomness and blindness. The manual description of protocol specification which requires more expert knowledge, is tedious and does not support the protocol without public document, which limits the effect of current network protocol fuzzer. In this paper, we present PNFUZZ, a fuzzer that adopts the state inference based on packet clustering algorithm and coverage oriented mutation strategy. We train a clustering model through the target protocol packet, and use the model to identify the server’s protocol state, thereby optimizing the process of testcase generation. The experimental results show that the proposed approach has a certain improvement in fuzzing effect.
APA, Harvard, Vancouver, ISO, and other styles
6

Sun, Xiaoshan, Yu Fu, Yun Dong, Zhihao Liu, and Yang Zhang. "Improving Fitness Function for Language Fuzzing with PCFG Model." In 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC). IEEE, 2018. http://dx.doi.org/10.1109/compsac.2018.00098.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Duchene, Fabien, Roland Groz, Sanjay Rawat, and Jean-Luc Richier. "XSS Vulnerability Detection Using Model Inference Assisted Evolutionary Fuzzing." In 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation (ICST). IEEE, 2012. http://dx.doi.org/10.1109/icst.2012.181.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Jiajie, Tao Guo, Puhan Zhang, and Qixue Xiao. "A Model-Based Behavioral Fuzzing Approach for Network Service." In 2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control (IMCCC). IEEE, 2013. http://dx.doi.org/10.1109/imccc.2013.250.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Xu, Haoran, Yongjun Wang, Shuhui Fan, Peidai Xie, and Aizhi Liu. "DSmith: Compiler Fuzzing through Generative Deep Learning Model with Attention." In 2020 International Joint Conference on Neural Networks (IJCNN). IEEE, 2020. http://dx.doi.org/10.1109/ijcnn48605.2020.9206911.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Johansson, William, Martin Svensson, Ulf E. Larson, Magnus Almgren, and Vincenzo Gulisano. "T-Fuzz: Model-Based Fuzzing for Robustness Testing of Telecommunication Protocols." In 2014 IEEE Seventh International Conference on Software Testing, Verification and Validation (ICST). IEEE, 2014. http://dx.doi.org/10.1109/icst.2014.45.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography