Главная
Study mode:
on
1
Intro
2
OS Fuzzing - Overview
3
Synthetic Program Generation
4
Trace Distillation vs. User-Level Seed Selection
5
Distillation Challenges
6
Tracking Implicit Dependencies
7
Implementation
8
Evaluation - Setup
9
Effectiveness of Distillation
10
Conclusion
11
Coverage Improvement
Description:
Explore an innovative approach to optimizing OS fuzzer seed selection through trace distillation in this USENIX Security '18 conference talk. Dive into the challenges of generating effective seed system call sequences for OS fuzzing and learn how MoonShine, a novel strategy, addresses these issues. Discover how MoonShine leverages light-weight static analysis to efficiently detect dependencies across system calls, distilling millions of system calls from real-world programs into a compact, diverse set of seeds. Examine the implementation of MoonShine as an extension to Syzkaller, a state-of-the-art evolutionary fuzzer for the Linux kernel, and analyze its impressive results in improving code coverage and uncovering new vulnerabilities. Gain insights into the comparison between trace distillation and user-level seed selection, the challenges of distillation, and the techniques for tracking implicit dependencies. Evaluate the effectiveness of this approach through detailed setup and performance metrics, concluding with a discussion on the significant improvements in coverage achieved by MoonShine. Read more

MoonShine - Optimizing OS Fuzzer Seed Selection with Trace Distillation

USENIX
Add to list
0:00 / 0:00