Feeds

FUZZING'24 기조연설: "AI가 퍼징에 유용한가?"

Summary

이 기조연설에서는 AI가 퍼징 기술에 어떻게 적용될 수 있는지를 탐구합니다. 퍼징은 소프트웨어의 취약점을 찾기 위한 중요한 방법론으로, AI의 활용이 이 과정에서 어떤 이점을 제공할 수 있는지에 대한 논의가 이루어집니다. AI의 발전이 퍼징의 효율성과 효과성을 어떻게 향상시킬 수 있는지를 살펴보는 기회가 될 것입니다.
FUZZING'24 Keynote: "Is 'AI' useful for fuzzing?" by Brendan Dolan-Gavitt
FUZZING'24 Keynote: "Is 'AI' useful for fuzzing?" by Brendan Dolan-Gavitt Abstract: Discussion of AI and its applications to security seems unavoidable nowadays, and, alas, this keynote is no exception. But is it actually useful for problems we care about, like fuzzing? In classic academic fashion I will answer “maybe” at great length, but hopefully with enough concrete examples and references to actual code that the talk will be worth listening to. I will cover: 1) Places where it seems obviously misguided (input generation in the fuzzing loop); 2) Areas where it seems to have demonstrable benefits (harness generation); and 3) Promising future directions (generating input seeds, evolving input seed generators). Bio: Brendan Dolan-Gavitt is an Assistant Professor in the Computer Science and Engineering Department at NYU-Poly. He holds a Ph.D. in computer science from Georgia Tech (2014) and a BA in Math and Computer Science from Wesleyan University (2006). Dolan-Gavitt’s research interests span many areas of cyber security, including program analysis, virtualization security, memory forensics, and embedded and cyber-physical systems. His research focuses on developing techniques to ease or automate the understanding of large, real-world software systems in order to develop novel defenses against attacks, typically by subjecting them to static and dynamic analyses that reveal hidden and undocumented assumptions about their design and behavior. His work has been presented at top security conferences such as the ACM Conference on Computer and Communications Security (CCS) and the IEEE Symposium on Security and Privacy. He also led the development of PANDA, an open-source platform for architecture-neutral dynamic analysis, which has users around the world and has been featured in technical press such as The Register. His most recent work, which focuses on developing techniques to probe industrial control systems for vulnerabilities, has been funded by the Office of Naval Research. Prior to joining NYU, he was a postdoctoral researcher at Columbia University.
youtube.com

Content

FUZZING'24 Keynote: "Is 'AI' useful for fuzzing?" - https://www.youtube.com/watch?v=4BPJXmrdmls
FUZZING'24 Keynote: "Is 'AI' useful for fuzzing?" by Brendan Dolan-Gavitt
FUZZING'24 Keynote: "Is 'AI' useful for fuzzing?" by Brendan Dolan-Gavitt Abstract: Discussion of AI and its applications to security seems unavoidable nowadays, and, alas, this keynote is no exception. But is it actually useful for problems we care about, like fuzzing? In classic academic fashion I will answer “maybe” at great length, but hopefully with enough concrete examples and references to actual code that the talk will be worth listening to. I will cover: 1) Places where it seems obviously misguided (input generation in the fuzzing loop); 2) Areas where it seems to have demonstrable benefits (harness generation); and 3) Promising future directions (generating input seeds, evolving input seed generators). Bio: Brendan Dolan-Gavitt is an Assistant Professor in the Computer Science and Engineering Department at NYU-Poly. He holds a Ph.D. in computer science from Georgia Tech (2014) and a BA in Math and Computer Science from Wesleyan University (2006). Dolan-Gavitt’s research interests span many areas of cyber security, including program analysis, virtualization security, memory forensics, and embedded and cyber-physical systems. His research focuses on developing techniques to ease or automate the understanding of large, real-world software systems in order to develop novel defenses against attacks, typically by subjecting them to static and dynamic analyses that reveal hidden and undocumented assumptions about their design and behavior. His work has been presented at top security conferences such as the ACM Conference on Computer and Communications Security (CCS) and the IEEE Symposium on Security and Privacy. He also led the development of PANDA, an open-source platform for architecture-neutral dynamic analysis, which has users around the world and has been featured in technical press such as The Register. His most recent work, which focuses on developing techniques to probe industrial control systems for vulnerabilities, has been funded by the Office of Naval Research. Prior to joining NYU, he was a postdoctoral researcher at Columbia University.
youtube.com