Finding instrumentable locations for fuzzing via static binary analysis

The Cyber Security Lab (CSL) of Nanyang Technological University (NTU) has developed a fuzzer designed for binary-only targets across multiple architecture. The fuzzer employs an approach known as Steelix to solve the limited code penetration and effectiveness of some existing fuzzers. However...

Full description

Saved in:
Bibliographic Details
Main Author: Ng, Li Jie
Other Authors: Liu Yang
Format: Final Year Project
Language:English
Published: Nanyang Technological University 2022
Subjects:
Online Access:https://hdl.handle.net/10356/156709
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-156709
record_format dspace
spelling sg-ntu-dr.10356-1567092022-04-25T12:11:14Z Finding instrumentable locations for fuzzing via static binary analysis Ng, Li Jie Liu Yang School of Computer Science and Engineering yangliu@ntu.edu.sg Engineering::Computer science and engineering The Cyber Security Lab (CSL) of Nanyang Technological University (NTU) has developed a fuzzer designed for binary-only targets across multiple architecture. The fuzzer employs an approach known as Steelix to solve the limited code penetration and effectiveness of some existing fuzzers. However, for Steelix to work, some information on the binary must be gathered prior to the fuzzing. To gather these, a python script is used. While the fuzzer is designed for multiple architecture, the current implementation of the python script is not. This project aims to extends the existing implementation and explore ways to optimize the current implementation wherever possible. Bachelor of Engineering (Computer Science) 2022-04-25T12:11:14Z 2022-04-25T12:11:14Z 2022 Final Year Project (FYP) Ng, L. J. (2022). Finding instrumentable locations for fuzzing via static binary analysis. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/156709 https://hdl.handle.net/10356/156709 en application/pdf Nanyang Technological University
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering::Computer science and engineering
spellingShingle Engineering::Computer science and engineering
Ng, Li Jie
Finding instrumentable locations for fuzzing via static binary analysis
description The Cyber Security Lab (CSL) of Nanyang Technological University (NTU) has developed a fuzzer designed for binary-only targets across multiple architecture. The fuzzer employs an approach known as Steelix to solve the limited code penetration and effectiveness of some existing fuzzers. However, for Steelix to work, some information on the binary must be gathered prior to the fuzzing. To gather these, a python script is used. While the fuzzer is designed for multiple architecture, the current implementation of the python script is not. This project aims to extends the existing implementation and explore ways to optimize the current implementation wherever possible.
author2 Liu Yang
author_facet Liu Yang
Ng, Li Jie
format Final Year Project
author Ng, Li Jie
author_sort Ng, Li Jie
title Finding instrumentable locations for fuzzing via static binary analysis
title_short Finding instrumentable locations for fuzzing via static binary analysis
title_full Finding instrumentable locations for fuzzing via static binary analysis
title_fullStr Finding instrumentable locations for fuzzing via static binary analysis
title_full_unstemmed Finding instrumentable locations for fuzzing via static binary analysis
title_sort finding instrumentable locations for fuzzing via static binary analysis
publisher Nanyang Technological University
publishDate 2022
url https://hdl.handle.net/10356/156709
_version_ 1731235737163005952