<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="static/style.xsl"?><OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd"><responseDate>2026-04-14T03:40:07Z</responseDate><request verb="GetRecord" identifier="oai:www.recercat.cat:2117/379942" metadataPrefix="oai_dc">https://recercat.cat/oai/request</request><GetRecord><record><header><identifier>oai:recercat.cat:2117/379942</identifier><datestamp>2025-07-17T15:49:22Z</datestamp><setSpec>com_2072_1033</setSpec><setSpec>col_2072_452951</setSpec></header><metadata><oai_dc:dc xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:doc="http://www.lyncode.com/xoai" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd">
   <dc:title>Fuzzing a MACsec Key Agreement Protocol Application</dc:title>
   <dc:title>Developing a Fuzzing testing tool for MACsec Key Agreement Protocol</dc:title>
   <dc:creator>Sans Falip, Roger</dc:creator>
   <dc:contributor>Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors</dc:contributor>
   <dc:contributor>Technica electronics</dc:contributor>
   <dc:contributor>Llorca Queralt, Ramón</dc:contributor>
   <dc:subject>Àrees temàtiques de la UPC::Informàtica::Seguretat informàtica</dc:subject>
   <dc:subject>Computer security</dc:subject>
   <dc:subject>MACsec</dc:subject>
   <dc:subject>MKA</dc:subject>
   <dc:subject>Fuzzing</dc:subject>
   <dc:subject>libFuzzer</dc:subject>
   <dc:subject>Seguretat informàtica</dc:subject>
   <dc:description>Along this thesis, a popular testing technique to find bugs and vulnerabilities called fuzzing is implemented in order to exploit an application developed by Technica Electronics Barcelona S.L. First, a study of how the application works is required in order to properly design the tests. This application implements the MACsec (a layer 2 secure communication protocol) Key Agreement Protocol. Then, a testing environment is generated to test the software of Technica Electronics using fuzzing. Finally, results are analyzed to find any security vulnerabilities the application may present. Preliminary results showed that the code is already robust as no bugs were found.</dc:description>
   <dc:date>2022-07-07</dc:date>
   <dc:type>Master thesis</dc:type>
   <dc:identifier>https://hdl.handle.net/2117/379942</dc:identifier>
   <dc:identifier>ETSETB-230.172649</dc:identifier>
   <dc:language>eng</dc:language>
   <dc:rights>S'autoritza la difusió de l'obra mitjançant la llicència Creative Commons o similar 'Reconeixement-NoComercial- SenseObraDerivada'</dc:rights>
   <dc:rights>Open Access</dc:rights>
   <dc:format>application/pdf</dc:format>
   <dc:publisher>Universitat Politècnica de Catalunya</dc:publisher>
</oai_dc:dc></metadata></record></GetRecord></OAI-PMH>