Finding instrumentable locations for fuzzing via static binary analysis
The Cyber Security Lab (CSL) of Nanyang Technological University (NTU) has developed a fuzzer designed for binary-only targets across multiple architecture. The fuzzer employs an approach known as Steelix to solve the limited code penetration and effectiveness of some existing fuzzers. However...
Saved in:
Main Author: | Ng, Li Jie |
---|---|
Other Authors: | Liu Yang |
Format: | Final Year Project |
Language: | English |
Published: |
Nanyang Technological University
2022
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/156709 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
Finding instrumentable locations for fuzzing via static binary analysis
by: Ng, Lyon Hong Kai
Published: (2022) -
Finding instrumentable locations for fuzzing via static binary analysis
by: Ong, Kwang Wee
Published: (2023) -
Fuzzing Linux binaries with AFL++
by: Lim, Wei Cheng
Published: (2023) -
Finding bugs inside IoT devices via static analysis
by: Lim, Gerald Ze Yang
Published: (2022) -
A comparative study of fuzzing tools on instrumental analysis
by: Huang, Xinyan
Published: (2024)