Finding instrumentable locations for fuzzing via static binary analysis
The Cyber Security Lab (CSL) of Nanyang Technological University (NTU) has developed a fuzzer designed for binary-only targets across multiple architecture. The fuzzer employs an approach known as Steelix to solve the limited code penetration and effectiveness of some existing fuzzers. However...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
Nanyang Technological University
2022
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/156709 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Summary: | The Cyber Security Lab (CSL) of Nanyang Technological University (NTU) has
developed a fuzzer designed for binary-only targets across multiple architecture.
The fuzzer employs an approach known as Steelix to solve the limited code
penetration and effectiveness of some existing fuzzers. However, for Steelix to work,
some information on the binary must be gathered prior to the fuzzing. To gather
these, a python script is used. While the fuzzer is designed for multiple architecture,
the current implementation of the python script is not. This project aims to extends
the existing implementation and explore ways to optimize the current implementation
wherever possible. |
---|