Builds of Fuzzware (https://github.com/fuzzware-fuzzer/fuzzware)
298
Note: In case you would like to make sure you are using the latest version of fuzzware (which we recommend), refer to the GitHub Repo: https://github.com/fuzzware-fuzzer/fuzzware
We built these docker images to allow evaluating Fuzzware down the road, even if dependencies change and may make building Fuzzware on a specific version challenging (especially the artifact evaluation version).
Note on Performance: To make the binaries within the docker container as compatible as possible, we removed the
-march=nativebuild option from Unicorn for these builds. This may slightly reduce the performance of the Unicorn binary.
The docker container itself includes only Fuzzware's code, but no firmware samples. To get started using Fuzzware, you may use your own targets, or our sample set from the fuzzware-experiments repository.
# On the host
git clone https://github.com/fuzzware-fuzzer/fuzzware-experiments
sudo ./fuzzware-experiments/helper_scripts/set_limits_and_prepare_afl.sh
# The user within the docker container has uid=1000. If your local user does not, you will need to navigate file permissions
# One way of doing this is the following:
if [ $(id -u) -ne 1000 ]; then
sudo chown -R 1000:1000 fuzzware-experiments
fi
docker run --mount type=bind,source=$(pwd)/fuzzware-experiments,target=/home/user/fuzzware/targets -i -t fuzzware/fuzzware:latest
# Within the container
cd 01-access-modeling-for-fuzzing/pw-discovery/ARCH_PRO
fuzzware pipeline --skip-afl-cpufreq .
Note on user IDs:
| Tag | Description |
|---|---|
| sec22-ae-accepted | The version of Fuzzware as it was accepted in the USENIX Security 2022 Artifact Evaluation. |
| latest | The latest version at the time of pushing these images: daca61db16ba864293956c97983c3ff612b4e170. |
Content type
Image
Digest
Size
738.3 MB
Last updated
over 3 years ago
Requires Docker Desktop 4.37.1 or later.