A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Breaking Through Binaries: Compiler-quality Instrumentation for Better Binary-only Fuzzing
2021
USENIX Security Symposium
Coverage-guided fuzzing is one of the most effective software security testing techniques. Fuzzing takes on one of two forms: compiler-based or binary-only, depending on the availability of source code. While the fuzzing community has improved compiler-based fuzzing with performanceand feedback-enhancing program transformations, binaryonly fuzzing lags behind due to the semantic and performance limitations of instrumenting code at the binary level. Many fuzzing use cases are binary-only (i.e.,
dblp:conf/uss/NagyNHDH21
fatcat:ey3q4amsgfezhh4qcyq3u5dwji