Abstract: Open-source software is extensively used in modern systems due to its flexibility and cost efficiency; however, it often contains hidden security vulnerabilities that traditional testing methods may fail to detect. Fuzz testing is an automated technique that addresses this challenge by supplying programs with random and malformed inputs to uncover crashes and weaknesses.
This paper presents a web-based system that demonstrates how fuzzing improves the security of open-source files. The system allows users to upload single files, multiple files, or compressed archives and simulates the processes of building, instrumentation, and fuzzing. Security improvements are analyzed using metrics such as code coverage, crash detection, vulnerability count, and overall security score. A comparative evaluation is performed to highlight the difference in software robustness before and after fuzzing.
The proposed system integrates an interactive frontend with a FastAPI-based backend to provide real-time progress visualization and automated result reporting. The results indicate that fuzzing significantly enhances the stability and security of open-source files, emphasizing its effectiveness as a proactive software security testing approach.

Keywords: Fuzz Testing, Open Source Software Security, Automated Vulnerability Detection, Software Testing, File Security.


Downloads: PDF | DOI: 10.17148/IJARCCE.2025.1412110

How to Cite:

[1] Dr. Puneeth GJ, Amruta MM, B Susheela, Bharathi H K, Harikiran CS, "Improving Open Source Files Security Using Fuzzing," International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), DOI: 10.17148/IJARCCE.2025.1412110

Open chat
Chat with IJARCCE