Exploring Deficiencies in Automatic Vuln Mining Technology
Offered By: Hack In The Box Security Conference via YouTube
Course Description
Overview
Syllabus
Intro
Target
Current Reality
Feedback-driven Genetic Algorithm
Core of GA
Symbolic Execution manager contexts
Block libFuzzer and AFL
Block OSYM and KLEE
Stutter Fuzzers
Inapproximable Constraint ibFuzzer and AFL have their own methods to deal with condition statement
Feedback of libFuzzer
Distance Algorithm of libFuzzer
Massive Bug-free Paths
Discovery 1. Coverage is losing its effectiveness. 2. Selecting path is better than traversing. 3. Constraint solver is necessary.
Sufficient and necessary constraints
Variable Constraint Back Propagation Replace Symbol Expr with New Expr
Transformation of constraint expressions
Back Propagation on LLVM bitcode
Imitate manual code review 1. Make assumptions and initial constraints
Taught by
Hack In The Box Security Conference
Related Courses
Automated Visual Software AnalyticsopenHPI JavaScript Testing
Udacity Desarrollo de Aplicaciones Web: Prueba y Despliegue
University of New Mexico via Coursera 软件工程
Peking University via Coursera Building R Packages
Johns Hopkins University via Coursera