Skip to content

Commit 204c03e

Browse files
authored
Update README.md
1 parent ea1c2ef commit 204c03e

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ This example shows how to use MuttFuzz with AFL (or AFLplusplus) but using it wi
4848

4949
**Q**: How good is MuttFuzz?
5050

51-
**A**: We're not sure yet, experiments are pending. We know that a source-based variant of the same technique, somewhat less tuned, outperformed AFLplusplus on FuzzBench, so we're optimistic that this is both easier to use and even more effective than that. In our limited experiments thus far, it is dramatically improving fuzzing a toy benchmark using AFL, much more than the source-based approach did, and, one more realistic "anecdata" suggests it's well worth trying out on stubborn fuzzing targets. An extremely subtle bug in a Turbo Boyer-Moore-Horspool search implementation, originally detected after literally months of fuzzing and billions of executions, via this harness (https://github.com/agroce/deepstate-boyer-moore-horspool/), can be detected easily and consistently using MuttFuzz. Your target may have similar behaviors that are rendered much easier to detect via mutant fuzzing. To try it, grab the deepstate AFL++ Docker image (agroce/deepstate_examples_aflpp) and do:
51+
**A**: We're not sure yet, experiments are pending. We know that a source-based variant of the same technique, somewhat less tuned, outperformed AFLplusplus on FuzzBench, so we're optimistic that this is both easier to use and even more effective than that. In our limited experiments thus far, it is dramatically improving fuzzing a toy benchmark using AFL, much more than the source-based approach did. Additionally, and more interestingly, one realistic "anecdata" suggests it's well worth trying out on stubborn fuzzing targets. An extremely subtle bug in a Turbo Boyer-Moore-Horspool search implementation, originally detected after literally months of fuzzing and billions of executions, via this harness (https://github.com/agroce/deepstate-boyer-moore-horspool/), can be detected easily and consistently using MuttFuzz. Your target may have similar behaviors that are rendered much easier to detect via mutant fuzzing. To try it, grab the deepstate AFL++ Docker image (agroce/deepstate_examples_aflpp) and do:
5252

5353
```
5454
cd ~/examples/deepstate-boyer-moore-horspool/

0 commit comments

Comments
 (0)