Exploring Deficiencies in Automatic Vuln Mining Technology

Exploring Deficiencies in Automatic Vuln Mining Technology

Hack In The Box Security Conference via YouTube Direct link

Intro

1 of 19

1 of 19

Intro

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Exploring Deficiencies in Automatic Vuln Mining Technology

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Target
  3. 3 Current Reality
  4. 4 Feedback-driven Genetic Algorithm
  5. 5 Core of GA
  6. 6 Symbolic Execution manager contexts
  7. 7 Block libFuzzer and AFL
  8. 8 Block OSYM and KLEE
  9. 9 Stutter Fuzzers
  10. 10 Inapproximable Constraint ibFuzzer and AFL have their own methods to deal with condition statement
  11. 11 Feedback of libFuzzer
  12. 12 Distance Algorithm of libFuzzer
  13. 13 Massive Bug-free Paths
  14. 14 Discovery 1. Coverage is losing its effectiveness. 2. Selecting path is better than traversing. 3. Constraint solver is necessary.
  15. 15 Sufficient and necessary constraints
  16. 16 Variable Constraint Back Propagation Replace Symbol Expr with New Expr
  17. 17 Transformation of constraint expressions
  18. 18 Back Propagation on LLVM bitcode
  19. 19 Imitate manual code review 1. Make assumptions and initial constraints

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.