This repository is a fork of OSS-Fuzz project. OSS-Sydr-Fuzz contains open source software targets for sydr-fuzz that combines fuzzing (libFuzzer, AFL++) with the power of dynamic symbolic execution (Sydr).
Each open source target project provides:
- Fuzz target for libFuzzer
- Fuzz target for AFL++
- Fuzz target for Sydr
- Target built with llvm-cov
- Build script
- Dictionary
- Initial seed corpus
- Dockerfile that installs dependencies, builds targets, creates initial corpus, etc.
- Hybrid fuzzing configuration file for sydr-fuzz
- Instructions to start hybrid fuzzing
NOTE: Some listed above files may not be present or can be gathered from external repositories.
Supported projects are located here.
Feel free to support new fuzz targets. The workflow is following:
- Compose targets for libFuzzer and Sydr.
- Prepare build script.
- Build Dockerfile with all targets.
- Provide sydr-fuzz configuration files.
- Write README with commands to run fuzzing.
The list of discovered bugs can be found here.
Sydr-Fuzz: Continuous Hybrid Fuzzing and Dynamic Analysis for Security Development Lifecycle [paper] [demo] [slides]
Vishnyakov A., Kuts D., Logunova V., Parygina D., Kobrin E., Savidov G., Fedotov A. Sydr-Fuzz: Continuous Hybrid Fuzzing and Dynamic Analysis for Security Development Lifecycle. 2022 Ivannikov ISPRAS Open Conference (ISPRAS), IEEE, 2022, pp. 111-123. DOI: 10.1109/ISPRAS57371.2022.10076861
@inproceedings{vishnyakov22-sydr-fuzz,
title = {{{Sydr-Fuzz}}: Continuous Hybrid Fuzzing and Dynamic Analysis for
Security Development Lifecycle},
author = {Vishnyakov, Alexey and Kuts, Daniil and Logunova, Vlada and
Parygina, Darya and Kobrin, Eli and Savidov, Georgy and Fedotov,
Andrey},
booktitle = {2022 Ivannikov ISPRAS Open Conference (ISPRAS)},
pages = {111--123},
year = {2022},
publisher = {IEEE},
doi = {10.1109/ISPRAS57371.2022.10076861},
}