Please use this identifier to cite or link to this item:
Title: Finding instrumentable locations for fuzzing via static binary analysis
Authors: Ng, Li Jie
Keywords: Engineering::Computer science and engineering
Issue Date: 2022
Publisher: Nanyang Technological University
Source: Ng, L. J. (2022). Finding instrumentable locations for fuzzing via static binary analysis. Final Year Project (FYP), Nanyang Technological University, Singapore.
Abstract: The Cyber Security Lab (CSL) of Nanyang Technological University (NTU) has developed a fuzzer designed for binary-only targets across multiple architecture. The fuzzer employs an approach known as Steelix to solve the limited code penetration and effectiveness of some existing fuzzers. However, for Steelix to work, some information on the binary must be gathered prior to the fuzzing. To gather these, a python script is used. While the fuzzer is designed for multiple architecture, the current implementation of the python script is not. This project aims to extends the existing implementation and explore ways to optimize the current implementation wherever possible.
Fulltext Permission: restricted
Fulltext Availability: With Fulltext
Appears in Collections:SCSE Student Reports (FYP/IA/PA/PI)

Files in This Item:
File Description SizeFormat 
  Restricted Access
3.45 MBAdobe PDFView/Open

Page view(s)

Updated on May 18, 2022


Updated on May 18, 2022

Google ScholarTM


Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.