Главная
Study mode:
on
1
Intro
2
How do Fuzzer Work?
3
Architecture
4
Intel Processor Trace
5
Nyx - One Input
6
Nyx - Performance
7
Reset Device State
8
Reset Memory
9
Reset Hard Disk
10
Harnesses
11
Specify Test Scenarios
12
Interactive Targets
13
Fuzzing
14
A Better Tool...
15
Root Cause Analysis
16
Heap Feng Shui
17
Code that doesn't run?
18
AntiFuzz
19
Key Takeaways
Description:
Explore the cutting-edge world of fuzzing technologies in this 50-minute Black Hat conference talk. Discover the current capabilities and future potential of fuzzing, complete with live demonstrations, discussions of CVEs, and a new release. Gain insights from four years of intensive fuzzing research as presenters Cornelius Aschermann and Sergej Schumilo delve into topics such as Intel Processor Trace, Nyx architecture, performance optimization, and innovative techniques like Heap Feng Shui. Learn about effective harness creation, interactive target fuzzing, and strategies to overcome anti-fuzzing measures. Walk away with key takeaways that will enhance your understanding of modern fuzzing methodologies and their applications in cybersecurity.

What the Fuzz

Black Hat
Add to list
0:00 / 0:00