Skip to content

Commit

Permalink
Update Lab2.md
Browse files Browse the repository at this point in the history
  • Loading branch information
hpacheco authored Mar 5, 2024
1 parent 144358e commit 1fabbc5
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion labs/Lab2.md
Original file line number Diff line number Diff line change
Expand Up @@ -485,7 +485,7 @@ The approaches behind dudect and ct-fuzz have been developed specifically for cr

The goal of this lab is to experiment with the automated testing tools described above. We will detect and fix the vulnerabilities found in example C programs from the [c/SARD-testsuite-100](../c/SARD-testsuite-100) testsuite.
1. Study and try out the tools described above.
2. Choose one vulnerable program from [c/SARD-testsuite-100](../c/SARD-testsuite-100) to analyse. To make it interesting, your chosen vulnerable program should only crash or lead to a security vulnerability for some inputs, but not for all inputs. It is not mandatory to choose examples from this dataset; you may also choose examples of vulnerable C programs from other resources such as the datasets illustrated in [Lab 1](Lab1.md). Alternatively, you may wish to try out a more realistic example from, e.g., Google's FuzzBench [benchmarks](https://github.com/google/fuzzbench/tree/master/benchmarks).
2. Choose one vulnerable program from [c/SARD-testsuite-100](../c/SARD-testsuite-100) to analyse. To make it interesting, your chosen vulnerable program should only crash or lead to a security vulnerability for some inputs, but not for all inputs. It is not mandatory to choose examples from this dataset; you may also choose examples of vulnerable C programs from other resources such as the datasets illustrated in [Lab 1](Lab1.md). You may also wish to try out a more realistic example from, e.g., Google's FuzzBench [benchmarks](https://github.com/google/fuzzbench/tree/master/benchmarks).
4. Test your program with some of the above tools. You should try at least one basic black-box fuzzing tool (Radamsa or Blab) and one symbolic execution tool (KLEE); or make sure to explore other grey-box fuzzing tools (AFL and onwards).
5. **In your group's GitHub repository, write a small report to the markdown file `Lab2.md`.**
6. The report shall discuss:
Expand Down

0 comments on commit 1fabbc5

Please sign in to comment.