Skip to content

Commit

Permalink
remove taken proj
Browse files Browse the repository at this point in the history
  • Loading branch information
kdsjZh committed Nov 14, 2024
1 parent 5cac836 commit c50e3a8
Showing 1 changed file with 0 additions and 16 deletions.
16 changes: 0 additions & 16 deletions epflprojects/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -228,22 +228,6 @@ <h5 id="evaluation-on-syscall-filtering-techniques">Evaluation on Syscall Filter
<p>There are some existing techniques or features that can be used for this purpose, like Seccomp, Seccomp-cBPF, and Seccomp Notify provided by the Linux kernel, along with some methods from research papers. They offer various capabilities and trade-offs in filtering syscalls for certain vulnerabilities.</p>
<p>In this project, we will evaluate these syscall filtering techniques, by reproducing some known 0-day exploits, applying the syscall filtering techniques, and checking if the exploits can be successfully blocked.</p>
<p>A candidate should be proficient in C programming and have a good grasp of Linux internals.</p>
<h5 id="benchmarking-fuzzers-for-seed-selection-capability">Benchmarking Fuzzers For Seed Selection Capability</h5>
<ul>
<li>Point of contact: <a href="mailto:[email protected]">Han Zheng</a></li>
<li>Keywords: Benchmark, Fuzzing</li>
</ul>
<p>Fuzzing is an efficient software testing technique to reveal bugs. Therefore it has been widely investigated both in academia and industry. Despite the growth of the newly proposed fuzzing prototypes, evaluating the fuzzer’s coverage capability is still challenging.</p>
<p>Existing platforms like fuzzbench pick the well-constructed harness, which enable the fuzzers to iterate over each seed in the queue exhaustively.<br />
Nevertheless, real-world scenarios might deviate from this ideal: seed explosion widely exists, fuzzer’s seed selection capability is critical and should not be deprioritize in the evaluation.</p>
<p>In this project, we will extend fuzzbench to more complex targets, which allows a more thorough assessment of fuzzer’s seed selection capability.</p>
<p>The goal of this project:</p>
<ul>
<li>design a metric to define and select the “complex” targets</li>
<li>integrate the target into the fuzzbench and evaluate existing fuzzers</li>
<li>propose some metrics other than coverage to assess the seed selection capability.</li>
</ul>
<p>A candidate should be interested in (ideally familiar with) the following: * Python * Basic knowledge of configure/cmake/make * Experience with Coverage Guided Greybox Fuzzer (e.g., AFL/AFL++)</p>
<h5 id="hyper-cube2-for-64-bit-hypervisors">Hyper-Cube2 for 64-bit Hypervisors</h5>
<ul>
<li>Point of contact: <a href="mailto:[email protected]">Qiang Liu</a></li>
Expand Down

0 comments on commit c50e3a8

Please sign in to comment.