Exploring Deficiencies in Automatic Vuln Mining Technology
Offered By: Hack In The Box Security Conference via YouTube
Course Description
Overview
Syllabus
Intro
Target
Current Reality
Feedback-driven Genetic Algorithm
Core of GA
Symbolic Execution manager contexts
Block libFuzzer and AFL
Block OSYM and KLEE
Stutter Fuzzers
Inapproximable Constraint ibFuzzer and AFL have their own methods to deal with condition statement
Feedback of libFuzzer
Distance Algorithm of libFuzzer
Massive Bug-free Paths
Discovery 1. Coverage is losing its effectiveness. 2. Selecting path is better than traversing. 3. Constraint solver is necessary.
Sufficient and necessary constraints
Variable Constraint Back Propagation Replace Symbol Expr with New Expr
Transformation of constraint expressions
Back Propagation on LLVM bitcode
Imitate manual code review 1. Make assumptions and initial constraints
Taught by
Hack In The Box Security Conference
Related Courses
Browser Hacking With ANGLEHack In The Box Security Conference via YouTube Can A Fuzzer Match A Human
Hack In The Box Security Conference via YouTube Biometrics System Hacking in the Age of the Smart Vehicle
Hack In The Box Security Conference via YouTube ICEFALL - Revisiting A Decade Of OT Insecure-By-Design Practices
Hack In The Box Security Conference via YouTube Fuzzing the MCU of Connected Vehicles for Security and Safety
Hack In The Box Security Conference via YouTube