A Study on MS Crash Analyzer


KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 9, pp. 399-404, Sep. 2013
10.3745/KTCCS.2013.2.9.399,   PDF Download:

Abstract

MSEC(Microsoft Security Engineering Center) performed fuzz testing Windows Vista with 350 million test cases for 14 months before launching it. They analyzed crashes resulted from the testing and developed crash analyzer !exploitable based on the data used to determine exploitability. In this paper, we describe how MS crash analyzer determines exploitability of crashes. Besides, we suggest an improvement to overcome the limitations found in the MS crash analyzer during the analysis.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
M. S. Noh, J. B. Na, G. U. Jung, J. C. Ryou, B. N. Noh, "A Study on MS Crash Analyzer," KIPS Transactions on Computer and Communication Systems, vol. 2, no. 9, pp. 399-404, 2013. DOI: 10.3745/KTCCS.2013.2.9.399.

[ACM Style]
Myoung Sun Noh, Jong Bae Na, Gwang Un Jung, Jae Cheol Ryou, and Bong Nam Noh. 2013. A Study on MS Crash Analyzer. KIPS Transactions on Computer and Communication Systems, 2, 9, (2013), 399-404. DOI: 10.3745/KTCCS.2013.2.9.399.