We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Modern Fuzzing of Media-processing projects

Formale Metadaten

Titel
Modern Fuzzing of Media-processing projects
Untertitel
Keeping media processing secure and stable
Serientitel
Anzahl der Teile
611
Autor
Lizenz
CC-Namensnennung 2.0 Belgien:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen.
Identifikatoren
Herausgeber
Erscheinungsjahr
Sprache
Produktionsjahr2017

Inhaltliche Metadaten

Fachgebiet
Genre
Abstract
The talk gives an overview of fuzzing of media formats based on our experiencein Google Chrome. Besides those tips and tricks, we will also share how OpenMedia developers may join a recently announced OSS-Fuzz project to use apowerful (thousands of CPU cores) and automated fuzzing infrastructure forfree. In this talk, we will be speaking about guided in-process approach to fuzzingof Media-processing projects. We will explain advantages of continuous fuzzingusing libFuzzer fuzzing engine, different memory tools such asAddressSanitizer and others fuzzing engines as well. Media processing is always a complex thing. An appropriate and fine-tuned fuzztesting is a great way to uncover lots of security and stability issues. Justremember [Stagefright] or [FFmpeg and a thousand fixes], for example. At the end of the talk, we will share success stories of libFuzzer applicationfor fuzzing of Media processing in Chromium browser and other projects. Also we will present OSS-Fuzz project aimed to help Open Source Software tohave continuous fuzzing at scale. The talk is meant for C/C++ developers and test engineers working on Media-processing projects. After the talk, attendees will be able to writelibFuzzer-based fuzzers, will know how to analyze performance of theirfuzzers, how to improve them, and, finally, will be able to increase testcoverage of their projects by adding of continuous fuzz testing.