Finding instrumentable locations for fuzzing via static binary analysis
The Cyber Security Lab (CSL) of Nanyang Technological University (NTU) has developed a fuzzer designed for binary-only targets across multiple architecture. The fuzzer employs an approach known as Steelix to solve the limited code penetration and effectiveness of some existing fuzzers. However...
Main Author: | Ng, Li Jie |
---|---|
Other Authors: | Liu Yang |
Format: | Final Year Project (FYP) |
Language: | English |
Published: |
Nanyang Technological University
2022
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/156709 |
Similar Items
-
Finding instrumentable locations for fuzzing via static binary analysis
by: Ng, Lyon Hong Kai
Published: (2022) -
Finding instrumentable locations for fuzzing via static binary analysis
by: Ong, Kwang Wee
Published: (2023) -
Fuzzing Linux binaries with AFL++
by: Lim, Wei Cheng
Published: (2023) -
Performing binary fuzzing using concolic execution
by: Valdez, Steven (Steven D.)
Published: (2016) -
Pre-fuzzing analysis with Ghidra vs Ida
by: Ng, Ron Jian Ying
Published: (2019)