This is the artifact repository of FUZZILLI: Fuzzing for JavaScript JIT Compiler Vulnerabilities presented at NDSS'23.
@inproceedings{ndss.2023.24290,
author = {Groß, Samuel and Koch, Simon and Bernhard, Lukas and Holtz, Thorsten and Johns, Martin},
title = {Fuzzilli: Fuzzing for JavaScript JIT Compiler Vulnerabilities},
year = {2023},
booktitle = {Network and Distributed Systems Security (NDSS) Symposium 2023},
doi={\url{https://dx.doi.org/10.14722/ndss.2023.24290}}
}
We evaluated Fuzzilli and Superion and compared their code coverage in general and concerning JIT compiler related code in particular. As Superion requires an input corpus we opted to use the open dataset provided by DIE. Our artifacts concerning intial coverage and a reduced input corpus is here.
This org contains the artifacts required for reproducability, i.e., the input corpus we used for Superion.
If there are any questions feel free to contact us.