Exploring Deficiencies in Automatic Vuln Mining Technology
Hack In The Box Security Conference via YouTube
Overview
Syllabus
Intro
Target
Current Reality
Feedback-driven Genetic Algorithm
Core of GA
Symbolic Execution manager contexts
Block libFuzzer and AFL
Block OSYM and KLEE
Stutter Fuzzers
Inapproximable Constraint ibFuzzer and AFL have their own methods to deal with condition statement
Feedback of libFuzzer
Distance Algorithm of libFuzzer
Massive Bug-free Paths
Discovery 1. Coverage is losing its effectiveness. 2. Selecting path is better than traversing. 3. Constraint solver is necessary.
Sufficient and necessary constraints
Variable Constraint Back Propagation Replace Symbol Expr with New Expr
Transformation of constraint expressions
Back Propagation on LLVM bitcode
Imitate manual code review 1. Make assumptions and initial constraints
Taught by
Hack In The Box Security Conference