This is the repository for the Introduction to Fuzzing Lab run by ACM Cyber at UCLA. Click on one of the links below to get started!
| Week | Topic | Slides | Lab |
|---|---|---|---|
| Week 2 | Intro to Fuzzing | Slides | Using Honggfuzz |
| Week 3 | Fuzzing Libraries | Slides | Fuzzing Libraries |
| Week 4 | Writing Harnesses | Slides | Writing Harnesses |
| Week 5 | Coverage Analysis | Slides | Writing Harnesses |
| Week 6 | Structure-Aware Fuzzing | Slides | Work on Project |
| Week 7 | Project Work | Slides | Work on Project |
| Week 8 | Wrapping Up | Slides | Work on Project |
| Week 9 | Break for Thanksgiving | – | – |
| Week 10 | Present at Symposium | – | – |
Interested to see what previous groups worked on? Check out our blog post.
As part of Fuzzing Lab, you will get to participate in a quarter-long project where you will use the skills that you’ve learned to fuzz a new target of your choice. For more information about the project, check out the project description.
Java remains one of the most widely used programming platforms for servers, enterprise applications, Android…
Ubuntu users often download software directly from developer websites instead of using the default app…
Installing Ubuntu 26.04 LTS is only the first step toward building a smooth, secure, and…
What is a Software Supply Chain Attack? A software supply chain attack occurs when a…
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…