Please use this identifier to cite or link to this item:
https://hdl.handle.net/10356/150328
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chen, Taoyu | en_US |
dc.date.accessioned | 2021-06-13T11:56:40Z | - |
dc.date.available | 2021-06-13T11:56:40Z | - |
dc.date.issued | 2021 | - |
dc.identifier.citation | Chen, T. (2021). Instruction level branch condition penetration for BiFF. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/150328 | en_US |
dc.identifier.uri | https://hdl.handle.net/10356/150328 | - |
dc.description.abstract | Fuzzing is one of the most widely deployed techniques to discover software security vulnerabilities. Despite the increasing popularity of fuzzing, many existing fuzzers requires source code to conduct fuzzing. For binary-only fuzzing, the execution speed of existing fuzzers is usually slow due to heavy instrumentation. And many of them may not support fuzzing on multiple CPU architectures. A fuzzer named BiFF is designed to support fuzzing cross-architecture and fuzzing for binary-only target with reasonable overhead. Another problem with existing fuzzers is their limited code penetration and effectiveness as the new testing inputs are generated randomly and therefore hard to detect errors that reside on deeper level. A fuzzing approach called Steelix is designed to solve this problem. It collects program-state information (i.e., comparison progress information) and use it to guide the mutation of input. Steelix has proven to be both effective and efficient in terms of penetration and execution. To enhance the branch condition penetration power and support fast fuzzing on binary-only target cross-architecture, we integrated the idea of Steelix into the fuzzer BiFF. This report elaborates the mechanism, implementation and performance of BiFF with Steelix incorporated. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Nanyang Technological University | en_US |
dc.relation | SCSE20-0191 | en_US |
dc.subject | Engineering::Computer science and engineering | en_US |
dc.title | Instruction level branch condition penetration for BiFF | en_US |
dc.type | Final Year Project (FYP) | en_US |
dc.contributor.supervisor | Liu Yang | en_US |
dc.contributor.school | School of Computer Science and Engineering | en_US |
dc.description.degree | Bachelor of Engineering (Computer Science) | en_US |
dc.contributor.supervisoremail | yangliu@ntu.edu.sg | en_US |
item.grantfulltext | restricted | - |
item.fulltext | With Fulltext | - |
Appears in Collections: | SCSE Student Reports (FYP/IA/PA/PI) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
FYP_Final_Report_Chen_Taoyu.pdf Restricted Access | 2.48 MB | Adobe PDF | View/Open |
Page view(s)
178
Updated on Jun 27, 2022
Download(s) 50
16
Updated on Jun 27, 2022
Google ScholarTM
Check
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.