Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/166215
Full metadata record
DC FieldValueLanguage
dc.contributor.authorOng, Kwang Weeen_US
dc.date.accessioned2023-04-24T06:27:24Z-
dc.date.available2023-04-24T06:27:24Z-
dc.date.issued2023-
dc.identifier.citationOng, K. W. (2023). Finding instrumentable locations for fuzzing via static binary analysis. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/166215en_US
dc.identifier.urihttps://hdl.handle.net/10356/166215-
dc.description.abstractIn the 21st century, the rapid growth of technology has become indispensable in people’s daily lives. Technological devices are built upon software programs, in which software programs are getting more complex in the development of technology. The exploitation of vulnerabilities exists in every software program is still prevalent, which leads to zero-day vulnerabilities. This highlights the importance of discovering pre-existing and patching against such vulnerabilities before exploitations could occur. In this study, we perform fuzzing on open-source projects in the Linux environment using American Fuzzy Lop Plus (AFL++). The input files (seeds) consist of a set of standard binary files in Unifuzz seed bank and previously submitted Proof-of-Concept (POC) files by other security researchers. This paper provides a detailed explanation and highlights each step taken for the fuzzing campaign done through a period of 7 months on the Program Under Test (PUT) with the seeds mentioned above. The crash found was a reproducible crash and the information on the vulnerability has been submitted to huntr.dev to notify the developers of the program.en_US
dc.language.isoenen_US
dc.publisherNanyang Technological Universityen_US
dc.relationSCSE22-0584en_US
dc.subjectEngineering::Computer science and engineeringen_US
dc.titleFinding instrumentable locations for fuzzing via static binary analysisen_US
dc.typeFinal Year Project (FYP)en_US
dc.contributor.supervisorLiu Yangen_US
dc.contributor.schoolSchool of Computer Science and Engineeringen_US
dc.description.degreeBachelor of Engineering Science (Computer Science)en_US
dc.contributor.supervisoremailyangliu@ntu.edu.sgen_US
item.grantfulltextrestricted-
item.fulltextWith Fulltext-
Appears in Collections:SCSE Student Reports (FYP/IA/PA/PI)
Files in This Item:
File Description SizeFormat 
FYP_Final_Report_ONGKWANGWEE.pdf
  Restricted Access
3.14 MBAdobe PDFView/Open

Page view(s)

233
Updated on Apr 27, 2025

Download(s)

27
Updated on Apr 27, 2025

Google ScholarTM

Check

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.