Skip to content
#

fuzzer

Here are 185 public repositories matching this topic...

joohoi
joohoi commented Feb 24, 2020

The --maxtime CLI flag should control the total execution time. However, the timer is reset for each new job added to the list by recursion detection that gets enabled by --recursion.

Additionally, add a new CLI flag --maxtime-job that counts towards the maximum execution time for each job, and if it hits, cancel the job and move forward to the next one.

This was reported OOB by @damia

Eh2406
Eh2406 commented Jan 23, 2019

Section 3.4 of the paper describes using gradient descent with a 2-point method for computing the gradient vector. This basically involves doing O(d) function calls to find the approximate gradient then doing a small number of calls to move in that direction. There is a long history of Derivative free Optimization Methods, that try to make each function evaluation do some of both. For example so

elopez
elopez commented Apr 23, 2020

When configuring echidna with balanceContract, but fuzzing a non-payable contract, echidna prints a Haskell exception instead of a meaningful error.

$ cat balance.yaml
balanceContract: 100
format: text

$ cat balance.sol
contract C {
  function f() public {}
  function echidna_true() public returns (bool) {return true;}
}

$ echidna-test balance.sol --config balance.yaml
Analy
bug
prjxray
litghost
litghost commented Feb 28, 2020
grep unknown opentitan.fasm  | wc
    557    6127   52651

557 bits isn't too many. Most of these are likely related to the DSP, as 1 DSP is being used:

DSP_L_X66Y110.DSP48.DSP_0.AREG_0
DSP_L_X66Y110.DSP48.DSP_0.BREG_0
DSP_L_X66Y110.DSP48.DSP_0.MASK[45:0] = 46'b1111111111111111111111111111111111111111111111
DSP_L_X66Y110.DSP48.DSP_0.ZADREG[0]
DSP_L_X66Y110.DSP48.DSP_0.ZAL
tomato42
tomato42 commented Jan 16, 2020

New test script idea

What TLS message this idea relates to?

ClientHello

What TLS extension this idea relates to?

signature_algorithms

What is the behaviour the test script should test?

RFC 8446, section B.3.1.3 and B.3.1.4 describe values, marked as obsolete_RESERVED that MUST NOT be offered or negotiated by TLS 1.3 implementations.

Check that presence of those

Improve this page

Add a description, image, and links to the fuzzer topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the fuzzer topic, visit your repo's landing page and select "manage topics."

Learn more

You can’t perform that action at this time.