AntiFuzz - Impeding Fuzzing Audits of Binary Executables
Offered By: USENIX via YouTube
Course Description
Overview
Explore a conference talk from USENIX Security '19 that introduces AntiFuzz, a novel approach to impede fuzzing audits of binary executables. Delve into techniques designed to protect binaries against automated bug-finding methods such as fuzzing, symbolic/concolic execution, and hybrid fuzzing. Learn about the systematic analysis of fundamental assumptions made by bug-finding tools and the development of general countermeasures. Discover how these techniques effectively hinder fuzzing audits while maintaining negligible performance overhead. Gain insights into the changing landscape of binary security and the shift from traditional obfuscation methods to strategies that target automated analysis tools.
Syllabus
Intro
Motivation
Assumptions
Detecting crashes
Why is FL so good
Constraints are solvable
Evaluation
Conclusion
Taught by
USENIX
Related Courses
Formal Software VerificationUniversity System of Maryland via edX Software Analysis & Testing
Georgia Institute of Technology via Udacity Computer Systems Security
Massachusetts Institute of Technology via MIT OpenCourseWare Reverse Engineering 3201: Symbolic Analysis
OpenSecurityTraining2 via Independent angr: Binary Analysis Framework - Demonstration and Analysis
New York University (NYU) via YouTube