[PDF][PDF] REDQUEEN: Fuzzing with Input-to-State Correspondence.
Automated software testing based on fuzzing has experienced a revival in recent years.
Especially feedback-driven fuzzing has become well-known for its ability to efficiently …
Especially feedback-driven fuzzing has become well-known for its ability to efficiently …
Binary rewriting without control flow recovery
Static binary rewriting has many important applications in software security and systems,
such as hardening, repair, patching, instrumentation, and debugging. While many different …
such as hardening, repair, patching, instrumentation, and debugging. While many different …
Odin: on-demand instrumentation with on-the-fly recompilation
Instrumentation is vital to fuzzing. It provides fuzzing directions and helps detect covert bugs,
yet its overhead greatly reduces the fuzzing throughput. To reduce the overhead, compilers …
yet its overhead greatly reduces the fuzzing throughput. To reduce the overhead, compilers …
Cipherfix: Mitigating Ciphertext {Side-Channel} Attacks in Software
Trusted execution environments (TEEs) provide an environment for running workloads in the
cloud without having to trust cloud service providers, by offering additional hardware …
cloud without having to trust cloud service providers, by offering additional hardware …
zpoline: a system call hook mechanism based on binary rewriting
This paper presents zpoline, a system call hook mechanism for x86-64 CPUs. zpoline
employs binary rewriting and offers seven advantages: 1) low hook overhead, 2) exhaustive …
employs binary rewriting and offers seven advantages: 1) low hook overhead, 2) exhaustive …
Hardening binaries against more memory errors
Memory errors, such as buffer overflows and use-after-free, remain the root cause of many
security vulnerabilities in modern software. The use of closed source software further …
security vulnerabilities in modern software. The use of closed source software further …
[PDF][PDF] Introduction to Procedural Debugging through Binary Libification
J Brossard - USENIX Workshop On Offensive Technologies (WOOT …, 2024 - usenix.org
Modify the ELF type from ET_EXEC to ET_DYN in the ELF header. typedef struct elf64_shdr
{Elf64_Word sh_name;/* Section name, index in string tbl*/Elf64_Word sh_type; …
{Elf64_Word sh_name;/* Section name, index in string tbl*/Elf64_Word sh_type; …
SaBRe: load-time selective binary rewriting
PA Arras, A Andronidis, L Pina, K Mituzas… - International Journal on …, 2022 - Springer
Binary rewriting consists in disassembling a program to modify its instructions. However,
existing solutions suffer from shortcomings in terms of soundness and performance. We …
existing solutions suffer from shortcomings in terms of soundness and performance. We …
Honey, I shrunk the ELFs: Lightweight binary tailoring of shared libraries
In the embedded domain, industrial sectors (ie, automotive industry, avionics) are
undergoing radical changes. They broadly adopt commodity hardware and move away from …
undergoing radical changes. They broadly adopt commodity hardware and move away from …
Scalable fuzzing of program binaries with E9AFL
Greybox fuzzing is an effective method for software testing. Greybox fuzzers, such as AFL,
use instrumentation that collects path coverage information in order to guide the fuzzing …
use instrumentation that collects path coverage information in order to guide the fuzzing …