Security assessment for application network services using fault injection

Hyungwoo Kang, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)


Vulnerabilities in network protocol software have been problematic since Internet infrastructure was deployed. These vulnerabilities damage the reliability of network software and create security holes in computing environment. Many critical security vulnerabilities exist in application network services of which specification or description has not been published. In this paper, we propose a security assessment methodology based on fault injection techniques to improve reliability of the application network services with no specifications published. We also implement a tool for security testing based on the proposed methodology. Windows RPC network services are chosen as an application network service considering its unknown protocol specification and are validated by the methodology. It turns out that the tool detects unknown vulnerabilities in Windows network module.

Original languageEnglish
Title of host publicationIntelligence and Security Informatics - Pacific Asia Workshop, PAISI 2007, Proceedings
PublisherSpringer Verlag
Number of pages12
ISBN (Print)9783540715481
Publication statusPublished - 2007
Event2007 Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2007 - Chengdu, China
Duration: 2007 Apr 112007 Apr 12

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4430 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Other2007 Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2007


  • Buffer overflow
  • Fault injection
  • RPC (remote procedure call)
  • Security assessment
  • Software security

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science


Dive into the research topics of 'Security assessment for application network services using fault injection'. Together they form a unique fingerprint.

Cite this