Finding instrumentable locations for fuzzing via static binary analysis
The Cyber Security Lab (CSL) of Nanyang Technological University (NTU) has developed a fuzzer designed for binary-only targets across multiple architecture. The fuzzer employs an approach known as Steelix to solve the limited code penetration and effectiveness of some existing fuzzers. However...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
Nanyang Technological University
2022
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/156709 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-156709 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1567092022-04-25T12:11:14Z Finding instrumentable locations for fuzzing via static binary analysis Ng, Li Jie Liu Yang School of Computer Science and Engineering yangliu@ntu.edu.sg Engineering::Computer science and engineering The Cyber Security Lab (CSL) of Nanyang Technological University (NTU) has developed a fuzzer designed for binary-only targets across multiple architecture. The fuzzer employs an approach known as Steelix to solve the limited code penetration and effectiveness of some existing fuzzers. However, for Steelix to work, some information on the binary must be gathered prior to the fuzzing. To gather these, a python script is used. While the fuzzer is designed for multiple architecture, the current implementation of the python script is not. This project aims to extends the existing implementation and explore ways to optimize the current implementation wherever possible. Bachelor of Engineering (Computer Science) 2022-04-25T12:11:14Z 2022-04-25T12:11:14Z 2022 Final Year Project (FYP) Ng, L. J. (2022). Finding instrumentable locations for fuzzing via static binary analysis. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/156709 https://hdl.handle.net/10356/156709 en application/pdf Nanyang Technological University |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Engineering::Computer science and engineering |
spellingShingle |
Engineering::Computer science and engineering Ng, Li Jie Finding instrumentable locations for fuzzing via static binary analysis |
description |
The Cyber Security Lab (CSL) of Nanyang Technological University (NTU) has
developed a fuzzer designed for binary-only targets across multiple architecture.
The fuzzer employs an approach known as Steelix to solve the limited code
penetration and effectiveness of some existing fuzzers. However, for Steelix to work,
some information on the binary must be gathered prior to the fuzzing. To gather
these, a python script is used. While the fuzzer is designed for multiple architecture,
the current implementation of the python script is not. This project aims to extends
the existing implementation and explore ways to optimize the current implementation
wherever possible. |
author2 |
Liu Yang |
author_facet |
Liu Yang Ng, Li Jie |
format |
Final Year Project |
author |
Ng, Li Jie |
author_sort |
Ng, Li Jie |
title |
Finding instrumentable locations for fuzzing via static binary analysis |
title_short |
Finding instrumentable locations for fuzzing via static binary analysis |
title_full |
Finding instrumentable locations for fuzzing via static binary analysis |
title_fullStr |
Finding instrumentable locations for fuzzing via static binary analysis |
title_full_unstemmed |
Finding instrumentable locations for fuzzing via static binary analysis |
title_sort |
finding instrumentable locations for fuzzing via static binary analysis |
publisher |
Nanyang Technological University |
publishDate |
2022 |
url |
https://hdl.handle.net/10356/156709 |
_version_ |
1731235737163005952 |