Please note that the ITEA Office will be closed from 25 December 2024 to 1 January 2025 inclusive.
DeltaFuzzer
- Project
- 17039 XIVT
- Description
- Identify BO for a specific target code location and provide their exploits
- Increases code coverage by 30%
- Achieves an accuracy and precision close to 100%
- Contact
- Ibéria Medeiros, FCUL: Faculty of Sciences of University of Lisboa
- ivmedeiros@fc.ul.pt
- Technical features
Input(s):
- C/C++ source code of a program to test
Main feature(s):
- Targeted fuzzing of a specific code location
- Identifies buffer overflows in C/C++ programs with confirmation with their existence
Output(s):
- A report with the vulnerabilities found and their exploits
- Integration constraints
- AFL
- LLVM
- cmake
- ninja
- gcc
- Python 3
- Targeted customer(s)
Software developers, Software testers.
- Conditions for reuse
Close-source
- Confidentiality
- Public
- Publication date
- 02-02-2022
- Involved partners
- Faculty of Sciences of University of Lisbon (PRT)