UNIVERSITY of NEW YORK in PRAGUE European Business

Total Page:16

File Type:pdf, Size:1020Kb

UNIVERSITY of NEW YORK in PRAGUE European Business UNIVERSITY OF NEW YORK IN PRAGUE European Business Administration Observation and Analysis of Freemium Business Model with Strategic Implication for the Czech Business Market. by Philipp Solovyev 2017 PATTISON William I, Philipp Solovyev, declare that the paper entitled: Observation and Analysis of Freemium Business Model with Strategic Implication for the Czech Business Market was written by myself independently, using the sources and information listed in the list of references. I am aware that my work will be published in accordance with § 47b of Act No. 111/1998 Coll., On Higher Education Institutions, as amended, and in accordance with the valid publication guidelines for university graduate theses. Prohlašuji, že jsem tuto práci vypracoval/a samostatně s použitím uvedené literatury a zdrojů informací. Jsem vědom/a, že moje práce bude zveřejněna v souladu s § 47b zákona č. 111/1998 Sb., o vysokých školách ve znění pozdějších předpisů, a v souladu s platnou Směrnicí o zveřejňování vysokoškolských závěrečných prací. In Prague, 19.12.2017 Philipp Solovyev Table of Contents 1. Introduction 1 1.1. The world before The Fourth Industrial Revolution 1 1.2. Adapting Business Model 2 1.3. The structure of the thesis 5 1.4. Methodology 6 1.5. Personal motivation 7 2. Literature review 9 2.1. Business model of free 9 2.2. It is all about services 10 2.3. Consumer Behavior 11 2.4. Business model canvas 12 2.4.1. Customer segments 13 2.4.2. Value propositions 15 2.4.3. Customer relationships 16 2.4.4. Channels 16 2.4.5. Revenue streams 18 2.4.6. Cost structure 19 2.5. Applicable framework 19 3. Case studies 21 3.1. Dropbox case study 21 3.2. Riot Games 24 3.3. Spotify 29 3.4. Qihoo 360 35 4. Analysis and comparison with literature review 42 4.1. Customer segments 42 4.2. Value propositions 43 4.3. Customer relationships 44 4.4. Channels 45 4.5. Revenue streams 46 4.6. Cost structure 47 4.7. Analysis summary 47 5. Interview 48 5.1. Analysis 49 5.2. Observations 52 6. Conclusion 54 6.1. Best practises 54 6.2. Next steps 56 Bibliography 57 Abstract This paper explores freemium distribution method within software industry. With claim that disruption in business world is significant, author hypothesizes the following question: “Is it possible to use distribution practices of freemium digital products in order to create a unique and diverse business model applicable for the industries outside of IT?” Firstly, analysis of academic sources is conducted in order to understand what freemium is and how it works. Then, case studies of established freemium firms are compared with theory. Next, findings are evaluated by comparison with personal interview conducted in freemium pioneer firm, Avast. By analyzing academic sources, comparing them to case studies and consequently evaluating findings by personally interviewing corporate manager of freemium firm, author presents reader with best practices applicable for future freemium practitioners. 1. Introduction 1.1. The world before The Fourth Industrial Revolution In the era of the digital world, new technologies play an important role in the business development and maintenance. Truly, it is significant for a successful business to communicate with the customers via various social networks, distribute services and products with mobile applications, and convert prospects into new leads through simple landing page websites. Using such advantageous digital tools is essential for businesses prosperity. Technological breakthroughs also put emphasis on classic business theories behind the functionality of newly-emerged tools. As an example, Web 2.0 appearance and consequent enhancement of business’ ability to interact with people and gather critical resources from the customers indicated how is feedback, transparency and brand value worthwhile in the business world. Inarguably, only by introducing new alternative ways to how basic websites could be used, business managers’ perception and awareness of stated business tools reshaped and arose drastically. However, innovation is followed by the disruption that makes once stable practices unusable and require firms to be flexible and adaptable to changes in order to have a sustainable and competitive business. KPMG’s global CEO survey-study (2016) greatly supports that claim in the scope of upcoming The Fourth Industrial Revolution that unimaginably merges digital, physical and biological areas, stating that it is necessary for organizations “to develop incredible agility to stay ahead of the disruption caused by the fourth industrial revolution”. 1 As of the competitiveness, KPMG’s study also concluded that “to remain competitive, manufacturers will need to innovate and invest in new technologies, which CEOs believe will have the biggest impact on the growth of their companies over the next three years.” Some older studies also reveal the same tendencies amongst CEOs. IBM (2008) global enterprise study declared that technology is one of the top three CEOs main concerns regarding the possible external impacts on their firms as well as the fact of a drastic gap between required change and current state. That said, it is crucial for companies to adapt new know-hows and technologies to be able to generate profits. Both studies suggest a number of ways to overcome these issues and both of them point out that business model renovation plays one of the biggest roles in that transformation, but what reasons are behind that? 1.2. Adapting Business Model A variety of case studies from previous years proved that enhancing firm’s business model in the context of new innovative implementation exponentially strengthens up positioning along competitors on the market as much as it strengthens its core value proposition. One of the most vivid recent examples is Netflix and Blockbuster case, in which the latter was mostly driven out of the market by the first. Back in 1997, Netflix used to have an insignificant market share and overall weak competitive power. The company had rather straightforward value proposition - by request, a customer was able to order any movie he wanted and Netflix would deliver a DVD by mail; however, this core competency is what made Netflix a worldwide brand. Blockbuster neglected even the slightest possibility of such firm to play a role of their competitor, seeing Netflix as a “very small niche business.” (Del Rowe, 2017) 2 Regardless of that, Blockbuster had an attempt to replicate and create similar service for their customers, but this experiment in 2005 was too belated in comparison to Netflix that practiced this method for 7 years and by the end of 2007 was already shifting its core competency, making deliveries of movies instantaneous via digital environment. (Del Rowe, 2017) Partially, it was because of the status quo on the market and “mainly because of the resistance of digital transformation” (Del Rowe, 2017), Blockbuster could not adapt and has gone forever. Now, Netflix is the most recognizable streaming cinema service, which once “embraced digital transformation and succeeded while Blockbuster fought it and failed.” (Del Rowe, 2017) Not only Innovation of business model can add to initial value proposition of the product or service but it also expands its ability to capture the value. One famous example of that might be seen in Apple’s combination of iTunes and iPod. By creating a software solution (iTunes) for comfortable music purchase and introducing it together with iPod, Apple achieved certain advantages from the perspective of business model: “the company built a groundbreaking business model that combined hardware, software, and service.” (Johnson, Christensen, & Kagermann, 2008) As a consequence, this greatly-tied combination of shiny hardware and innovative software granted firm the ability to consistently extract value from customers for a long period of time. At the time of release, the combination itself was only repeatable with the devices from the same manufacturer, meaning that a person could only access his iTunes library from an iOS-powered device only. And since communicating the value to the customer was never an issue for Apple, such approach made firm’s “...market capitalization catapult from around #1 billion in early 2003 to over $150 billion by late 2007.” (Johnson, Christensen, & Kagermann, 2008) 3 The authors of the Harvard Business Review article on the reinvention of business model draw a great comparison between stated above Apple’s model and so-called “razor and blade” model, pointing out that in the essence, first model is a reversed version of the latter. (Johnson, Christensen, & Kagermann, 2008) The definition of “razor and blade” model sheds light on that connection: “[firm] offers a durable product (i.e., the ‘razor’) at a low price (even at a loss) and more than makes up for the initial subsidy by charging a high price for the consumable complement (i.e., the ‘blades’) over the lifetime of the durable product.” (Dhebar, 2016) However, in Apple’s model complementary product and durable product are switched over as Apple charges a high price for the hardware product (e.g. iPod) and makes access to additional digital content relatively cheap. (e.g. iTunes music) This example shows that such model can work the other way around, charging a high price for the initial product and asking for lower payments for the complementary product. However, let us return to “razor and blade” model. As it has been noted above in the definition, the main product should be distributed “at a low price (even at a loss).” (Dhebar, 2016) This part of the definition provoked the author to ask the question - what if a company chose to distribute such product for no price, for free? After a brief research session, the author of this thesis realized that the hypothesized question has a definite and concrete answer. Such practice exists and thrives in the software industry with prevalence in mobile applications market where it works precisely as bequeathed by “razor and blade” model.
Recommended publications
  • 360 Antivirus for Pc Free Download Full Version
    360 Antivirus For Pc Free Download Full Version 360 Antivirus For Pc Free Download Full Version 1 / 3 2 / 3 Windows Defender is improving, but you still shouldn't rely on Windows 10's security ... Kaspersky Security Cloud Free offers full-scale malware protection and even some ... Bitdefender Antivirus Free Edition includes the same core antivirus ... The free Qihoo 360 Total Security 8.6 comes with a ton of bonus tools, but its core .... Integrating award winning antivirus systems including 360 QVMII, 360 Cloud Engine, Avira or BitDefender to offer you with the ultimate in virus detection and .... 360 Total Security Download Free Antivirus Cloud-based technology this software can detect most of the new virus ... Total Security Download Full Version ... This software is a complete security package for your PC, laptop or mobile device.. Download 360 Total Security 10.6.0.1223. Keep your PC safe with five antivirus engines. Protecting your PC is a day-to-day essential, as it's becoming ever .... 360 Total Security is an unified solution for your PC security and performance. ... 360 Total Security - Free Antivirus & Internet Security Software for PC 8.0.0.1046 ... With Full Check, you can examine the overall condition of your computer within ... Starting from version 9, users of 360 Total Security are able to upgrade to .... Download 360 Total Security Premium 10.6.0.1223 for Windows. Fast downloads of the latest free software! ... QIHU 360(Full Version) ... edge antivirus protection, which is powered by 360 Heuristic Engine, 360 Cloud Engine .... Download 360 Total Security 2020 offline installers for free and safe for your Windows PC.
    [Show full text]
  • Microsoft Security Intelligence Report
    Microsoft Security Intelligence Report Volume 20 | July through December, 2015 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. This document is provided “as-is.” Information and views expressed in this document, including URL and other Internet website references, may change without notice. You bear the risk of using it. Copyright © 2016 Microsoft Corporation. All rights reserved. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Authors Charlie Anthe Dana Kaufman Anthony Penta Cloud and Enterprise Security Azure Active Directory Team Safety Platform Nir Ben Zvi Nasos Kladakis Ina Ragragio Enterprise and Cloud Group Azure Active Directory Team Windows and Devices Group Patti Chrzan Daniel Kondratyuk Tim Rains Microsoft Digital Crimes Unit Azure Active Directory Team Commercial Communications Bulent Egilmez Andrea Lelli Paul Rebriy Office 365 - Information Windows Defender Labs Bing Protection Geoff McDonald Stefan Sellmer Elia Florio Windows Defender Labs Windows Defender Labs Windows Defender Labs Michael McLaughlin Mark Simos Chad Foster Identity Services Enterprise Cybersecurity Bing Group Nam Ng Roger Grimes Enterprise Cybersecurity Vikram Thakur Microsoft IT Group Windows Defender Labs Paul Henry Niall O'Sullivan Alex Weinert Wadeware LLC Microsoft Digital Crimes Unit Azure Active Directory Team Beth Jester Daryl Pecelj Terry Zink Windows Defender Microsoft IT Information
    [Show full text]
  • Netflix and Twitch Traffic Characterization
    University of Calgary PRISM: University of Calgary's Digital Repository Graduate Studies The Vault: Electronic Theses and Dissertations 2015-09-30 NetFlix and Twitch Traffic Characterization Laterman, Michel Laterman, M. (2015). NetFlix and Twitch Traffic Characterization (Unpublished master's thesis). University of Calgary, Calgary, AB. doi:10.11575/PRISM/27074 http://hdl.handle.net/11023/2562 master thesis University of Calgary graduate students retain copyright ownership and moral rights for their thesis. You may use this material in any way that is permitted by the Copyright Act or through licensing that has been assigned to the document. For uses that are not allowable under copyright legislation or licensing, you are required to seek permission. Downloaded from PRISM: https://prism.ucalgary.ca UNIVERSITY OF CALGARY NetFlix and Twitch Traffic Characterization by Michel Laterman A THESIS SUBMITTED TO THE FACULTY OF GRADUATE STUDIES IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE GRADUATE PROGRAM IN COMPUTER SCIENCE CALGARY, ALBERTA SEPTEMBER, 2015 c Michel Laterman 2015 Abstract Streaming video content is the largest contributor to inbound network traffic at the University of Calgary. Over five months, from December 2014 { April 2015, over 2.7 petabytes of traffic on 49 billion connections was observed. This thesis presents traffic characterizations for two large video streaming services, namely NetFlix and Twitch. These two services contribute a significant portion of inbound bytes. NetFlix provides TV series and movies on demand. Twitch offers live streaming of video game play. These services share many characteristics, including asymmetric connections, content delivery mechanisms, and content popularity patterns.
    [Show full text]
  • Forescout Counteract® Endpoint Support Compatibility Matrix Updated: October 2018
    ForeScout CounterACT® Endpoint Support Compatibility Matrix Updated: October 2018 ForeScout CounterACT Endpoint Support Compatibility Matrix 2 Table of Contents About Endpoint Support Compatibility ......................................................... 3 Operating Systems ....................................................................................... 3 Microsoft Windows (32 & 64 BIT Versions) ...................................................... 3 MAC OS X / MACOS ...................................................................................... 5 Linux .......................................................................................................... 6 Web Browsers .............................................................................................. 8 Microsoft Windows Applications ...................................................................... 9 Antivirus ................................................................................................. 9 Peer-to-Peer .......................................................................................... 25 Instant Messaging .................................................................................. 31 Anti-Spyware ......................................................................................... 34 Personal Firewall .................................................................................... 36 Hard Drive Encryption ............................................................................. 38 Cloud Sync ...........................................................................................
    [Show full text]
  • The Application Usage and Risk Report an Analysis of End User Application Trends in the Enterprise
    The Application Usage and Risk Report An Analysis of End User Application Trends in the Enterprise 8th Edition, December 2011 Palo Alto Networks 3300 Olcott Street Santa Clara, CA 94089 www.paloaltonetworks.com Table of Contents Executive Summary ........................................................................................................ 3 Demographics ............................................................................................................................................. 4 Social Networking Use Becomes More Active ................................................................ 5 Facebook Applications Bandwidth Consumption Triples .......................................................................... 5 Twitter Bandwidth Consumption Increases 7-Fold ................................................................................... 6 Some Perspective On Bandwidth Consumption .................................................................................... 7 Managing the Risks .................................................................................................................................... 7 Browser-based Filesharing: Work vs. Entertainment .................................................... 8 Infrastructure- or Productivity-Oriented Browser-based Filesharing ..................................................... 9 Entertainment Oriented Browser-based Filesharing .............................................................................. 10 Comparing Frequency and Volume of Use
    [Show full text]
  • CODASPY'17 ~ Decompression Quines and Anti-Viruses
    Decompression Quines and Anti-Viruses Margaux Canet Amrit Kumar Cédric Lauradoux Inria Inria Inria Univ. Grenoble Alpes Univ. Grenoble Alpes Mary-Andréa Reihaneh Safavi-Naini Rakotomanga University of Calgary Inria Univ. Grenoble Alpes ABSTRACT compression bombs also known as the zip of death exploit Data compression is ubiquitous to any information and com- the efficiency of compression algorithms to mount denial- munication system. It often reduces resources required to of-service (DoS) attacks. They often target web servers store and transmit data. However, the efficiency of com- and anti-viruses. Unfortunately, despite the fact that these pression algorithms also makes them an obvious target for threats have been known for years, some security products hackers to mount denial-of-service attacks. In this work, still remain vulnerable [9, 13]. we consider decompression quines, a specific class of com- The common definition of a decompression bomb found in pressed files that decompress to themselves. We analyze all the NIST guide [10] or the textbook [11] considers a small innocuous compressed file that decompresses to a gigantic the known decompression quines by studying their struc- 1 tures, and their impact on anti-viruses. Our analysis reveals file. A typical example of a decompression bomb is 42.zip that most of the anti-viruses do not have a suitable architec- (≈ 42 Kilobytes) that expands to 4.5 Petabytes. When a ture in place to detect decompression quines. Even worse, software attempts to naively decompress such a file, it con- some of them are vulnerable to denial-of-service attacks ex- sumes all the available memory and eventually crashes.
    [Show full text]
  • Security Survey 2014
    Security Survey 2014 www.av-comparatives.org IT Security Survey 2014 Language: English Last Revision: 28th February 2014 www.av-comparatives.org - 1 - Security Survey 2014 www.av-comparatives.org Overview Use of the Internet by home and business users continues to grow in all parts of the world. How users access the Internet is changing, though. There has been increased usage of smartphones by users to access the Internet. The tablet market has taken off as well. This has resulted in a drop in desktop and laptop sales. With respect to attacks by cyber criminals, this means that their focus has evolved. This is our fourth1 annual survey of computer users worldwide. Its focus is which security products (free and paid) are employed by users, OS usage, and browser usage. We also asked respondents to rank what they are looking for in their security solution. Survey methodology Report results are based on an Internet survey run by AV-Comparatives between 17th December 2013 and 17th January 2014. A total of 5,845 computer users from around the world anonymously answered the questions on the subject of computers and security. Key Results Among respondents, the three most important aspects of a security protection product were (1) Low impact on system performance (2) Good detection rate (3) Good malware removal and cleaning capabilities. These were the only criteria with over 60% response rate. Europe, North America and Central/South America were similar in terms of which products they used, with Avast topping the list. The share of Android as the mobile OS increased from 51% to 70%, while Symbian dropped from 21% to 5%.
    [Show full text]
  • Herein After a Reasonable Opportunity for Discovery
    Case 1:21-cv-06013 Document 1 Filed 07/13/21 Page 1 of 29 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK PEDRO BALDERAS, Individually and On Case No. Behalf of All Others Similarly Situated, Plaintiff, CLASS ACTION COMPLAINT v. JURY TRIAL DEMANDED 360 DIGITECH, INC., HAISHENG WU, JIANG WU, and ZUOLI XU, Defendants. Plaintiff Pedro Balderas (“Plaintiff”), individually and on behalf of all others similarly situated, by Plaintiff’s undersigned attorneys, for Plaintiff’s complaint against Defendants, alleges the following based upon personal knowledge as to Plaintiff and Plaintiff’s own acts, and information and belief as to all other matters, based upon, inter alia, the investigation conducted by and through Plaintiff’s attorneys, which included, among other things, a review of the Defendants’ public documents, conference calls and announcements made by Defendants, United States (“U.S.”) Securities and Exchange Commission (“SEC”) filings, wire and press releases published by and regarding 360 DigiTech, Inc. (“360 DigiTech” or the “Company”), analysts’ reports and advisories about the Company, and information readily obtainable on the Internet. Plaintiff believes that substantial additional evidentiary support will exist for the allegations set forth herein after a reasonable opportunity for discovery. NATURE OF THE ACTION 1. This is a federal securities class action on behalf of a class consisting of all persons and entities other than Defendants that purchased or otherwise acquired 360 DigiTech securities between April 30, 2020 and July 7, 2021, both dates inclusive (the “Class Period”), seeking to 1 Case 1:21-cv-06013 Document 1 Filed 07/13/21 Page 2 of 29 recover damages caused by Defendants’ violations of the federal securities laws and to pursue remedies under Sections 10(b) and 20(a) of the Securities Exchange Act of 1934 (the “Exchange Act”) and Rule 10b-5 promulgated thereunder, against the Company and certain of its top officials.
    [Show full text]
  • Tracking Users Across the Web Via TLS Session Resumption
    Tracking Users across the Web via TLS Session Resumption Erik Sy Christian Burkert University of Hamburg University of Hamburg Hannes Federrath Mathias Fischer University of Hamburg University of Hamburg ABSTRACT modes, and browser extensions to restrict tracking practices such as User tracking on the Internet can come in various forms, e.g., via HTTP cookies. Browser fingerprinting got more difficult, as trackers cookies or by fingerprinting web browsers. A technique that got can hardly distinguish the fingerprints of mobile browsers. They are less attention so far is user tracking based on TLS and specifically often not as unique as their counterparts on desktop systems [4, 12]. based on the TLS session resumption mechanism. To the best of Tracking based on IP addresses is restricted because of NAT that our knowledge, we are the first that investigate the applicability of causes users to share public IP addresses and it cannot track devices TLS session resumption for user tracking. For that, we evaluated across different networks. As a result, trackers have an increased the configuration of 48 popular browsers and one million of the interest in additional methods for regaining the visibility on the most popular websites. Moreover, we present a so-called prolon- browsing habits of users. The result is a race of arms between gation attack, which allows extending the tracking period beyond trackers as well as privacy-aware users and browser vendors. the lifetime of the session resumption mechanism. To show that One novel tracking technique could be based on TLS session re- under the observed browser configurations tracking via TLS session sumption, which allows abbreviating TLS handshakes by leveraging resumptions is feasible, we also looked into DNS data to understand key material exchanged in an earlier TLS session.
    [Show full text]
  • “Hidden Backdoor” in Qihoo 360 Secure Browser
    Independent Report on Alledged “Hidden Backdoor” in Qihoo 360 Secure Browser . IDF Laboratory Release Date: November 25, 2012 INTELLIGENCE DEFENSE FRIENDS LABORATORY http://www.idf.cn IDF Laboratory Version: <1.4> Independent Report on Alledged “Hidden Backdoor” in Qihoo 360 Date: <24/11/2012> Secure Browser Document Sign:IDF-REPDOC-20121124 Copyright Statement This research report is complied by IDF laboratory, unless it is published and agreed, its copyright belongs to IDF laboratory. While the quoted parts in the report belong to the original writer or corresponding units. Without the permission of IDF laboratory and the writer, any unit and individual are not allowed to transfer the contents of this report or use for other purpose, and this report is only for the reference of the industry research without commercial purposes. Welcome your criticism and correction. IDF Laboratory (Intelligence Defense Friends Laboratory) is a technical civil club for the enthusiasts of network information security, the backbone of which is made up of professionals, technicians and hobbyists from relevant fields. The research direction of IDF mainly focus on: the technical fields such as the development tendency of Internet threat, terminal security management, communication security of wireless network, botnet, as well as product research. IDF laboratory provides universal education of computer security knowledge for a great many enthusiasts of network information security, participates in the evaluation of the technology and market research for the products and development trends of relevant fields within the industry objectively and independently, thus providing the platform and bridge for the enthusiasts of network information security to be grow up as professional security or technical employees.
    [Show full text]
  • Esports Marketer's Training Mode
    ESPORTS MARKETER’S TRAINING MODE Understand the landscape Know the big names Find a place for your brand INTRODUCTION The esports scene is a marketer’s dream. Esports is a young industry, giving brands tons of opportunities to carve out a TABLE OF CONTENTS unique position. Esports fans are a tech-savvy demographic: young cord-cutters with lots of disposable income and high brand loyalty. Esports’ skyrocketing popularity means that an investment today can turn seri- 03 28 ous dividends by next month, much less next year. Landscapes Definitions Games Demographics Those strengths, however, are balanced by risk. Esports is a young industry, making it hard to navigate. Esports fans are a tech-savvy demographic: keyed in to the “tricks” brands use to sway them. 09 32 Streamers Conclusion Esports’ skyrocketing popularity is unstable, and a new Fortnite could be right Streamers around the corner. Channels Marketing Opportunities These complications make esports marketing look like a high-risk, high-reward proposition. But it doesn’t have to be. CHARGE is here to help you understand and navigate this young industry. Which games are the safest bets? Should you focus on live 18 Competitions events or streaming? What is casting, even? Competitions Teams Keep reading. Sponsors Marketing Opportunities 2 LANDSCAPE LANDSCAPE: GAMES To begin to understand esports, the tra- game Fortnite and first-person shooter Those gains are impressive, but all signs ditional sports industry is a great place game Call of Duty view themselves very point to the fact that esports will enjoy even to start. The sports industry covers a differently.
    [Show full text]
  • Attack Surface Analysis and Code Coverage Improvement for Fuzzing
    This document is downloaded from DR‑NTU (https://dr.ntu.edu.sg) Nanyang Technological University, Singapore. Attack surface analysis and code coverage improvement for fuzzing Peng, Lunan 2019 Peng, L. (2019). Attack surface analysis and code coverage improvement for fuzzing. Master's thesis, Nanyang Technological University, Singapore. https://hdl.handle.net/10356/105642 https://doi.org/10.32657/10356/105642 Downloaded on 07 Oct 2021 23:08:40 SGT Attack Surface Analysis and Code Coverage Improvement for Fuzzing PENG LUNAN School of Physical and Mathematical Sciences 2019 Attack Surface Analysis and Code Coverage Improvement for Fuzzing PENG LUNAN School of Physical and Mathematical Sciences A thesis submitted to the Nanyang Technological University in partial fulfillment of the requirements for the degree of Master of Science 2019 Supervisor Declaration Statement I have reviewed the content and presentation style of this thesis and declare it of sufficient grammatical clarity to be examined. To the best of my knowledge, the thesis is free of plagiarism and the research and writing are those of the candidate’s except as acknowledged in the Author Attribution Statement. I confirm that the investigations were conducted in accord with the ethics policies and integrity standards of Nanyang Technological University and that the research data are presented honestly and without prejudice. Date Wu Hongjun Abstract As cybercrime becoming a worldwide threat in the past decades, research on cyber- security keeps attracting a great deal of attention. During a long time competition between attackers and defenders, vulnerability detection has been considered as the decisive pre-step for both sides. Among the massive methodologies of vulnerability detection, fuzzing test has demonstrated its outstanding performance on finding bugs automatically and effectively.
    [Show full text]