TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities
▼
Available online for free from USENIX
.
Go Even Further Beyond
▲
Introduction
Important Information
Responsible Disclosure
Why I don't write exploits*
Publications
Papers
Talks
Miscellaneous
Research Rants
Lessons Learned from Automotive Cybersecurity
Fuzzers vs Games
Thinking about Fuzzer Evaluation
Software Development
Playing with Brownian Motion
JetBrains Remote Development
Go Even
Further
Beyond
▼