Building fuzzers @ Interrupt Labs |
Teaching @ Australian National University
https://adrian-herrera.com
arxiv.org/abs/2503.19402
arxiv.org/abs/2503.19402
Proposes a "programming language synthesis" approach for data-oriented attacks.
ilyasergey.net/assets/pdf/p...
Proposes a "programming language synthesis" approach for data-oriented attacks.
ilyasergey.net/assets/pdf/p...
1/ "Synthesis of Code-Reuse Attacks from p-code Programs"
Proposes a formal model of Ghidra's p-code which is used to synthsize code reuse attacks.
ora.ox.ac.uk/objects/uuid...
1/ "Synthesis of Code-Reuse Attacks from p-code Programs"
Proposes a formal model of Ghidra's p-code which is used to synthsize code reuse attacks.
ora.ox.ac.uk/objects/uuid...
Some fuzzers augment edge coverage with calling context info to find new program states. However, this often leads to state explosion. A static analysis predicts which program portions will benefit from tracking calling contexts, reducing state explosion.
Some fuzzers augment edge coverage with calling context info to find new program states. However, this often leads to state explosion. A static analysis predicts which program portions will benefit from tracking calling contexts, reducing state explosion.
Uses VirtIO to fuzz the Linux wireless subsystem. Built on LibAFL, includes a proxy system to collect real-world seeds, improving fuzzer performance.
Uses VirtIO to fuzz the Linux wireless subsystem. Built on LibAFL, includes a proxy system to collect real-world seeds, improving fuzzer performance.
With a focus on the Matter network protocol, walks through the process of using an LLM to transform a human-readable spec into something a fuzzer can leverage.
With a focus on the Matter network protocol, walks through the process of using an LLM to transform a human-readable spec into something a fuzzer can leverage.
Bugs relating to improper refcount use can be hard to fuzz. CountDown targets complex refcount behaviors to expose these bugs, instrumenting refcount ops and combining this with traditional coverage metrics.
Bugs relating to improper refcount use can be hard to fuzz. CountDown targets complex refcount behaviors to expose these bugs, instrumenting refcount ops and combining this with traditional coverage metrics.
The spiritual successor to “Evaluating Fuzz Testing”. Includes many great tips for fuzzer evaluation; e.g., not relying solely on CVEs to determine “real world impact”, and ensuring appropriate statistical tests are performed.
The spiritual successor to “Evaluating Fuzz Testing”. Includes many great tips for fuzzer evaluation; e.g., not relying solely on CVEs to determine “real world impact”, and ensuring appropriate statistical tests are performed.