Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Fuzzing BusyBox - Leveraging LLM and Crash Reuse for Embedded Bug Unearthing

USENIX via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Watch a 13-minute conference presentation from USENIX Security '24 exploring innovative techniques for enhancing software testing in BusyBox, a crucial open-source software package used extensively in Linux-based embedded devices. Learn about two groundbreaking approaches: utilizing Large Language Models (LLM) to generate target-specific initial seeds for fuzzing, and repurposing previously acquired crash data to streamline the testing process. Discover how researchers from the University of California, Davis and NetRise successfully identified vulnerabilities in BusyBox through these methods, demonstrating significant improvements in crash detection efficiency. Understand the practical implications of these techniques for vulnerability detection in embedded systems and their potential impact on the security of numerous devices relying on BusyBox functionality.

Syllabus

USENIX Security '24 - Fuzzing BusyBox: Leveraging LLM and Crash Reuse for Embedded Bug Unearthing

Taught by

USENIX

Reviews

Start your review of Fuzzing BusyBox - Leveraging LLM and Crash Reuse for Embedded Bug Unearthing

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.