mirror of
https://github.com/reactos/syzkaller.git
synced 2024-11-26 21:00:30 +00:00
3.5 KiB
3.5 KiB
Research work based on syzkaller
newer first
- A Novel Dynamic Analysis Infrastructure to Instrument Untrusted Execution Flow Across User-Kernel Spaces
- HFL: Hybrid Fuzzing on the Linux Kernel
- Industry Practice of Coverage-Guided Enterprise Linux Kernel Fuzzing
- Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints (source code)
- Task selection and seed selection for Syzkaller using reinforcement learning (announce only)
- Empirical Notes on the Interaction Between Continuous Kernel Fuzzing and Development
- FastSyzkaller: Improving Fuzz Efficiency for Linux Kernel Fuzzing
- Charm: Facilitating Dynamic Analysis of Device Drivers of Mobile Systems (video, slides)
- ALEXKIDD-FUZZER: Kernel Fuzzing Guided by Symbolic Information
- DIFUZE: Interface Aware Fuzzing for Kernel Drivers
- MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation
- RAZZER: Finding Kernel Race Bugs through Fuzzing
- SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits
- Towards Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities
- KOOBE: Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities
- Synthesis of Linux Kernel Fuzzing Tools Based on Syscall
- Drill the Apple Core: Up & Down
- WSL Reloaded
Other kernel fuzzing work
- KRACE: Data Race Fuzzing for Kernel File Systems
- trinity
- kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels (bridges AFL and Intel PT)
- kernel-fuzzing (bridges AFL and KCOV)
- A gentle introduction to Linux Kernel fuzzing (bridges AFL and KCOV)
- IMF: Inferred Model-based Fuzzer
Also see tech talks page.