Evaluating Code Coverage for Kernel Fuzzers via Function Call Graph
The OS kernel, which has full system privileges, is an attractive attack surface. A kernel fuzzer that targets system calls in fuzzing is a popular tool for discovering kernel bugs that can induce kernel privilege escalation attacks. To the best of our knowledge, the relevance of code coverage, whic...
Main Authors: | Mingi Cho, Hoyong Jin, Dohyeon An, Taekyoung Kwon |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2021-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9618942/ |
Similar Items
-
TAEF: A Task Allocation-Based Ensemble Fuzzing Framework for Optimizing the Advantages of Heterogeneous Fuzzers
by: Yutao Sun, et al.
Published: (2023-12-01) -
Battling against protocol fuzzing: protecting networked embedded devices from dynamic fuzzers
by: Liu, Puzhuo, et al.
Published: (2024) -
IoTFuzzBench: A Pragmatic Benchmarking Framework for Evaluating IoT Black-Box Protocol Fuzzers
by: Yixuan Cheng, et al.
Published: (2023-07-01) -
InsFuzz: Fuzzing Binaries With Location Sensitivity
by: Hanfang Zhang, et al.
Published: (2019-01-01) -
PSOFuzzer: A Target-Oriented Software Vulnerability Detection Technology Based on Particle Swarm Optimization
by: Chen Chen, et al.
Published: (2021-01-01)