TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Fuzzing Perl: A Tale of Two American Fuzzy Lops

82 点作者 geeknik将近 9 年前

4 条评论

moyix将近 9 年前
The paper [1] on AFLFast is, IMO, a great example of where academia shines: carefully looking at how and why something works, developing some theory and a working model, and then using that to get a substantial improvement on the state of the art (and doing a nice evaluation to show that it really works).<p>[1] <a href="https:&#x2F;&#x2F;www.comp.nus.edu.sg&#x2F;~mboehme&#x2F;paper&#x2F;CCS16.pdf" rel="nofollow">https:&#x2F;&#x2F;www.comp.nus.edu.sg&#x2F;~mboehme&#x2F;paper&#x2F;CCS16.pdf</a>
评论 #12331443 未加载
jjnoakes将近 9 年前
In the first pass, 6 bugs were found and reported. 3 heap-use-after-free, 3 heap-buffer-overflow. Similar numbers in the second.<p>I&#x27;m so glad new programming languages are making strides which prevent this sort of thing outright. They don&#x27;t prevent all bugs, but they sure prevent some of the most damaging ones.
评论 #12332682 未加载
评论 #12332659 未加载
rurban将近 9 年前
The published SEGV&#x27;s are not security relevant. They only happen in DEBUGGING output, which is not compiled into production perl&#x27;s. Unless you use an old redhat system, where they shipped 10x slower debugging perl.<p>I fixed the publicly reported bugs in 2 minutes. I cannot fix the other bugs since they were not reported to cperl (the perl5 fork which is doing the actual development of perl5). The perl5 security team is doing horrible work, so I would prefer to get the reports also, for independent and usually better fixes.<p>Brian Carpenter and Dan Collins provided excellent afl work lately for perl5.
评论 #12333614 未加载
thyrsus将近 9 年前
My understanding is that fuzz testing uses pseudo-random variation of the seed code; given a different seed to the PRNG, how common is it for the same fuzz test to identify different flaws?
评论 #12331726 未加载