Proceedings 2021 Workshop on Binary Analysis Research 2021
DOI: 10.14722/bar.2021.23003
|View full text |Cite
|
Sign up to set email alerts
|

JMPscare: Introspection for Binary-Only Fuzzing

Abstract: or may even actively guide the fuzzer with waypoints [4].Especially for binary-only fuzzing, after the initial setup runs, getting deeper knowledge about the fuzzer's actual performance, and figure out shortcomings and roadblocks, can be a daunting task. Often, reverse engineers will look at the resulting coverage maps, debug hand-picked, interestinglooking inputs, and load up several collected traces in existing tools like Lighthouse [12] and Dragondance [1]. However, with thousands of queue entries for a fu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…This demonstrates the use of the synthesized QEMU virtual machines to trigger, understand, and exploit vulnerabilities in rehosted Linux kernels. Second, we ported two fuzzing tools, UnicoreFuzz [143] and TriforceAFL [144], to show the ability to support other dynamic analysis tools on rehosted Linux kernels. These applications are not our main contribution, but they do illustrate the use cases of FIRMGUIDE.…”
Section: Discussionmentioning
confidence: 99%
“…This demonstrates the use of the synthesized QEMU virtual machines to trigger, understand, and exploit vulnerabilities in rehosted Linux kernels. Second, we ported two fuzzing tools, UnicoreFuzz [143] and TriforceAFL [144], to show the ability to support other dynamic analysis tools on rehosted Linux kernels. These applications are not our main contribution, but they do illustrate the use cases of FIRMGUIDE.…”
Section: Discussionmentioning
confidence: 99%
“…Another closely related effort is Maier et al 's JMPscare [172], which analyzes the cumulative coverage of a fuzzing campaign to identify the coverage frontier. The system supports patching target binaries in order to then use forced execution to cover new code across this frontier.…”
Section: Related Workmentioning
confidence: 99%