AntiFuzz - Impeding Fuzzing Audits of Binary Executables
Offered By: USENIX via YouTube
Course Description
Overview
Explore a conference talk from USENIX Security '19 that introduces AntiFuzz, a novel approach to impede fuzzing audits of binary executables. Delve into techniques designed to protect binaries against automated bug-finding methods such as fuzzing, symbolic/concolic execution, and hybrid fuzzing. Learn about the systematic analysis of fundamental assumptions made by bug-finding tools and the development of general countermeasures. Discover how these techniques effectively hinder fuzzing audits while maintaining negligible performance overhead. Gain insights into the changing landscape of binary security and the shift from traditional obfuscation methods to strategies that target automated analysis tools.
Syllabus
Intro
Motivation
Assumptions
Detecting crashes
Why is FL so good
Constraints are solvable
Evaluation
Conclusion
Taught by
USENIX
Related Courses
Securing Digital DemocracyUniversity of Michigan via Coursera Computer Science 101
Stanford University via Coursera Introduction to Cybersecurity for Business
University of Colorado System via Coursera Proactive Computer Security
University of Colorado System via Coursera How Computers Work
University of London International Programmes via Coursera