ITEA is the Eureka Cluster on software innovation
ITEA is the Eureka Cluster on software innovation
Dear visitor, please be informed that this is the ITEA staging environment. No actions here will be updated to production, feel free to test the system
ITEA 4 page header azure circular

DeltaFuzzer

Project
17039 XIVT
Description
  • Identify BO for a specific target code location and provide their exploits
  • Increases code coverage by 30%
  • Achieves an accuracy and precision close to 100%
Contact
Ibéria Medeiros, FCUL: Faculty of Sciences of University of Lisboa
Email
ivmedeiros@fc.ul.pt
Technical features

Input(s):

  • C/C++ source code of a program to test

Main feature(s):

  • Targeted fuzzing of a specific code location
  • Identifies buffer overflows in C/C++ programs with confirmation with their existence

Output(s):

  • A report with the vulnerabilities found and their exploits
Integration constraints
  • AFL
  • LLVM
  • cmake
  • ninja
  • gcc
  • Python 3
Targeted customer(s)

Software developers, Software testers.

Conditions for reuse

Close-source

Confidentiality
Public
Publication date
02-02-2022
Involved partners
Faculty of Sciences of University of Lisbon (PRT)