Watch a 13-minute conference presentation from USENIX Security '24 exploring innovative techniques for enhancing software testing in BusyBox, a crucial open-source software package used extensively in Linux-based embedded devices. Learn about two groundbreaking approaches: utilizing Large Language Models (LLM) to generate target-specific initial seeds for fuzzing, and repurposing previously acquired crash data to streamline the testing process. Discover how researchers from the University of California, Davis and NetRise successfully identified vulnerabilities in BusyBox through these methods, demonstrating significant improvements in crash detection efficiency. Understand the practical implications of these techniques for vulnerability detection in embedded systems and their potential impact on the security of numerous devices relying on BusyBox functionality.
Overview
Syllabus
USENIX Security '24 - Fuzzing BusyBox: Leveraging LLM and Crash Reuse for Embedded Bug Unearthing
Taught by
USENIX