Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/156709
Title: Finding instrumentable locations for fuzzing via static binary analysis
Authors: Ng, Li Jie
Keywords: Engineering::Computer science and engineering
Issue Date: 2022
Publisher: Nanyang Technological University
Source: Ng, L. J. (2022). Finding instrumentable locations for fuzzing via static binary analysis. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/156709
Abstract: The Cyber Security Lab (CSL) of Nanyang Technological University (NTU) has developed a fuzzer designed for binary-only targets across multiple architecture. The fuzzer employs an approach known as Steelix to solve the limited code penetration and effectiveness of some existing fuzzers. However, for Steelix to work, some information on the binary must be gathered prior to the fuzzing. To gather these, a python script is used. While the fuzzer is designed for multiple architecture, the current implementation of the python script is not. This project aims to extends the existing implementation and explore ways to optimize the current implementation wherever possible.
URI: https://hdl.handle.net/10356/156709
Fulltext Permission: restricted
Fulltext Availability: With Fulltext
Appears in Collections:SCSE Student Reports (FYP/IA/PA/PI)

Files in This Item:
File Description SizeFormat 
SCSE21-0223-Final-Report-Ng-Li-Jie.pdf
  Restricted Access
3.45 MBAdobe PDFView/Open

Page view(s)

22
Updated on May 18, 2022

Download(s)

2
Updated on May 18, 2022

Google ScholarTM

Check

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.