YoVDO

AntiFuzz - Impeding Fuzzing Audits of Binary Executables

Offered By: USENIX via YouTube

Tags

USENIX Security Courses Computer Security Courses Symbolic Execution Courses Fuzzing Courses

Course Description

Overview

Explore a conference talk from USENIX Security '19 that introduces AntiFuzz, a novel approach to impede fuzzing audits of binary executables. Delve into techniques designed to protect binaries against automated bug-finding methods such as fuzzing, symbolic/concolic execution, and hybrid fuzzing. Learn about the systematic analysis of fundamental assumptions made by bug-finding tools and the development of general countermeasures. Discover how these techniques effectively hinder fuzzing audits while maintaining negligible performance overhead. Gain insights into the changing landscape of binary security and the shift from traditional obfuscation methods to strategies that target automated analysis tools.

Syllabus

Intro
Motivation
Assumptions
Detecting crashes
Why is FL so good
Constraints are solvable
Evaluation
Conclusion


Taught by

USENIX

Related Courses

Formal Software Verification
University System of Maryland via edX
Software Analysis & Testing
Georgia Institute of Technology via Udacity
Computer Systems Security
Massachusetts Institute of Technology via MIT OpenCourseWare
Reverse Engineering 3201: Symbolic Analysis
OpenSecurityTraining2 via Independent
angr: Binary Analysis Framework - Demonstration and Analysis
New York University (NYU) via YouTube