Главная
Study mode:
on
1
Intro
2
Background
3
Bug's security impact
4
Motivation - Too many bugs to fix
5
Motivation - Too many patches to port
6
Questions to answer
7
Insight
8
Motivating example
9
Two modes of operations - Open vs Fixed bugs
10
Workflow - Fixed bugs & Open bugs
11
Fuzzing - New contexts verification
12
Fuzzer - Impact aware fuzzing
13
Symbolic Execution - Architecture
14
Symbolic Execution - Impacts identification
15
Overall results
16
Evaluation - Fuzzing
17
Evaluation - Symbolic execution
Description:
Explore the critical aspects of fuzzer-exposed bugs and their high-risk security impacts in this 32-minute conference talk. Delve into the challenges of managing numerous bugs and patches, and discover innovative approaches to prioritize and address security vulnerabilities. Learn about SyzScope's two operational modes for open and fixed bugs, and gain insights into its workflow. Examine the role of fuzzing in new context verification and impact-aware fuzzing techniques. Understand the architecture of symbolic execution and its application in identifying security impacts. Analyze the overall results and evaluation of fuzzing and symbolic execution methods presented by Xiaochen Zou from the University of California, Riverside.

SyzScope: Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs

Linux Foundation
Add to list