This is the repository for the Introduction to Fuzzing Lab run by ACM Cyber at UCLA. Click on one of the links below to get started!
| Week | Topic | Slides | Lab |
|---|---|---|---|
| Week 2 | Intro to Fuzzing | Slides | Using Honggfuzz |
| Week 3 | Fuzzing Libraries | Slides | Fuzzing Libraries |
| Week 4 | Writing Harnesses | Slides | Writing Harnesses |
| Week 5 | Coverage Analysis | Slides | Writing Harnesses |
| Week 6 | Structure-Aware Fuzzing | Slides | Work on Project |
| Week 7 | Project Work | Slides | Work on Project |
| Week 8 | Wrapping Up | Slides | Work on Project |
| Week 9 | Break for Thanksgiving | – | – |
| Week 10 | Present at Symposium | – | – |
Interested to see what previous groups worked on? Check out our blog post.
As part of Fuzzing Lab, you will get to participate in a quarter-long project where you will use the skills that you’ve learned to fuzz a new target of your choice. For more information about the project, check out the project description.
What is a Software Supply Chain Attack? A software supply chain attack occurs when a…
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…
A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…
How Does a Firewall Work Step by Step? What Is a Firewall and How Does…
People trying to securely connect to work are being tricked into doing the exact opposite.…