Skip to content
We hinder fuzzing
C C++ Python Makefile Shell M4 Other
Branch: master
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
antifuzz-tutorial @ 4612ee6 init Aug 16, 2019
docs init Aug 16, 2019
fuzzer add modified afl-2.51b Aug 16, 2019
lib/csmith init Aug 16, 2019
src init Aug 16, 2019
.gitmodules init Aug 16, 2019
README.md init Aug 16, 2019

README.md

About Fuzzification

Fuzzification helps developers protect the released, binary-only software from attackers who are capable of applying state-of-the-art fuzzing techniques. Given a performance budget, this approach aims to hinder the fuzzing process from adversaries as much as possible.

Existing Fuzzification components

  • SpeedBump: Amplifies the slowdown in normal executions by hundreds of times to the fuzzed execution.
  • BranchTrap: Interfers with feedback logic by hiding paths and polluting coverage maps.
  • AntiHybrid: Hinders taint-analysis and symbolic execution.

Envorinment

Tested on Ubuntu 16.04 64bit and LLVM 5.0 (with gold plugin)

Quick start

Authors

Publications

@inproceedings{jung2019fuzzification,
  title={FUZZIFICATION: Anti-Fuzzing Techniques},
  author={Jung, Jinho and Hu, Hong and Solodukhin, David and Pagan, Daniel and Lee, Kyu Hyung and Kim, Taesoo},
  booktitle={28th USENIX Security Symposium (USENIX Security 19)},
  pages={1913--1930},
  year={2019}
}
You can’t perform that action at this time.