https://github.com/sslab-gatech/fuzzification
We hinder fuzzing
https://github.com/sslab-gatech/fuzzification
Last synced: 9 months ago
JSON representation
We hinder fuzzing
- Host: GitHub
- URL: https://github.com/sslab-gatech/fuzzification
- Owner: sslab-gatech
- Created: 2019-01-24T15:27:48.000Z (almost 7 years ago)
- Default Branch: master
- Last Pushed: 2021-12-27T11:10:31.000Z (about 4 years ago)
- Last Synced: 2023-03-01T22:51:54.254Z (almost 3 years ago)
- Language: C
- Homepage:
- Size: 7.5 MB
- Stars: 57
- Watchers: 20
- Forks: 9
- Open Issues: 7
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# About Fuzzification
**Fuzzification** helps developers protect the released, binary-only software from attackers who are capable of applying state-of-the-art fuzzing techniques. Given a performance budget, this approach aims to hinder the fuzzing process from adversaries as much as possible.
# Existing Fuzzification components
* **SpeedBump**: Amplifies the slowdown in normal executions by hundreds of times to the fuzzed execution.
* **BranchTrap**: Interfers with feedback logic by hiding paths and polluting coverage maps.
* **AntiHybrid**: Hinders taint-analysis and symbolic execution.
# Envorinment
Tested on Ubuntu 16.04 64bit and LLVM 5.0 (with gold plugin)
# Quick start
* [Install instructions](docs/install.md)
* [Usage instructions](docs/usage.md)
# Authors
* **Jinho Jung (Point of Contact)**
* Hong Hu
* David Solodukhin
* Daniel Pagan
* Kyu Hyung Lee
* Taesoo Kim
# Publications
```
@inproceedings{jung2019fuzzification,
title={FUZZIFICATION: Anti-Fuzzing Techniques},
author={Jung, Jinho and Hu, Hong and Solodukhin, David and Pagan, Daniel and Lee, Kyu Hyung and Kim, Taesoo},
booktitle={28th USENIX Security Symposium (USENIX Security 19)},
pages={1913--1930},
year={2019}
}
```