Finding instrumentable locations for fuzzing via static binary analysis

The Cyber Security Lab (CSL) of Nanyang Technological University (NTU) has developed a fuzzer designed for binary-only targets across multiple architecture. The fuzzer employs an approach known as Steelix to solve the limited code penetration and effectiveness of some existing fuzzers. However...

Full description

Saved in:
Bibliographic Details
Main Author: Ng, Li Jie
Other Authors: Liu Yang
Format: Final Year Project
Language:English
Published: Nanyang Technological University 2022
Subjects:
Online Access:https://hdl.handle.net/10356/156709
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
Description
Summary:The Cyber Security Lab (CSL) of Nanyang Technological University (NTU) has developed a fuzzer designed for binary-only targets across multiple architecture. The fuzzer employs an approach known as Steelix to solve the limited code penetration and effectiveness of some existing fuzzers. However, for Steelix to work, some information on the binary must be gathered prior to the fuzzing. To gather these, a python script is used. While the fuzzer is designed for multiple architecture, the current implementation of the python script is not. This project aims to extends the existing implementation and explore ways to optimize the current implementation wherever possible.