Skip to content

Commit 50dbd1d

Browse files
committed
Updated README file (3)
1 parent b33c66d commit 50dbd1d

File tree

3 files changed

+7
-5
lines changed

3 files changed

+7
-5
lines changed

README.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -91,10 +91,12 @@ to install and load all required R packages.
9191

9292
#### Fuzzing Saturation / Stopping Criteria Analysis
9393

94-
- `fuzzer_cov_data.csv`: ...
95-
- `fuzzer_cov_saturation.csv`: ...
96-
- `fuzzer_crashes.csv`: ...
94+
- `fuzzer_cov_data.csv`: Contains the code and bug coverage of various fuzzers at different time points (15-minute intervals) within 24-hour fuzzing campaigns.
95+
- `fuzzer_cov_saturation.csv`: Contains the times at which the fuzzing campaigns are terminated according to the different saturation-based stopping criteria examined in this study.
96+
- `fuzzer_crashes.csv`: Contains the fuzzer crashes, including the time points when they were triggered and the deduplication (column `Bug_ID`[^1]) for extracting the unique bugs.
9797

9898
### Pre-trained Vulnerability Prediction Models
9999

100100
The pre-trained models can be found in the `./models` directory. Please refer to section `Green Fuzzing ... > ML-based Vulnerability Prediction > Vulnerability Prediction` in the `analysis.ipynb` notebook to see how these models can be used to predict potentially vulnerable functions.
101+
102+
[^1]: Crashes with the same bug ID have the same top $N=3$ stack frames and are therefore considered to have the same underlying vulnerability.

analysis.ipynb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3219,7 +3219,7 @@
32193219
"# corresponding line below (spoiler: the ratio of missed bugs hardly changes).\n",
32203220
"fuzzer_crashes = read.csv(\"./data/fuzzer_crashes.csv\") |>\n",
32213221
" # filter(Seed_Type == \"non-empty\") |>\n",
3222-
" distinct(Subject, Crash_ID) |>\n",
3222+
" distinct(Subject, Bug_ID) |>\n",
32233223
" group_by(Subject) |>\n",
32243224
" summarise(N_Unique_Bugs = n())\n",
32253225
"\n",

data/fuzzer_crashes.csv

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
"Subject","Fuzzer","Seed_Type","Trial_Nr","File","Function","Line","Stack_Trace","Trace_Length","Trace_File","Timestamp","Crash_ID"
1+
"Subject","Fuzzer","Seed_Type","Trial_Nr","File","Function","Line","Stack_Trace","Trace_Length","Trace_File","Timestamp","Bug_ID"
22
"JasPer","AFL","empty",2,"jas_malloc.c","jas_free",111,"jas_malloc.c:jas_free:111-jpc_dec.c:jpc_dec_cp_destroy:1557-jpc_dec.c:jpc_dec_destroy:1894-jpc_dec.c:jpc_decode:285-jp2_dec.c:jp2_decode:215-jas_image.c:jas_image_decode:372-jasper_fuzz.c:main:249",7,"%SRCROOT%/crash_traces/afl/jasper/seed_01/trial_02/crash_input_1633436959.trace","2021-10-05 14:29:19",61
33
"JasPer","AFL","empty",2,"jas_seq.c","jas_seq2d_create",89,"jas_seq.c:jas_seq2d_create:89-jpc_dec.c:jpc_dec_tileinit:699-jpc_dec.c:jpc_dec_process_sod:556-jpc_dec.c:jpc_dec_decode:390-jpc_dec.c:jpc_decode:254-jp2_dec.c:jp2_decode:215-jas_image.c:jas_image_decode:372-jasper_fuzz.c:main:249",8,"%SRCROOT%/crash_traces/afl/jasper/seed_01/trial_02/crash_input_1633433709.trace","2021-10-05 13:35:09",110
44
"JasPer","AFL","empty",2,"jpc_bs.c","jpc_bitstream_getbits",198,"jpc_bs.c:jpc_bitstream_getbits:198-jpc_t2dec.c:jpc_dec_decodepkt:314-jpc_t2dec.c:jpc_dec_decodepkts:454-jpc_dec.c:jpc_dec_process_sod:590-jpc_dec.c:jpc_dec_decode:390-jpc_dec.c:jpc_decode:254-jp2_dec.c:jp2_decode:215-jas_image.c:jas_image_decode:372-jasper_fuzz.c:main:249",9,"%SRCROOT%/crash_traces/afl/jasper/seed_01/trial_02/crash_input_1633436762.trace","2021-10-05 14:26:02",10

0 commit comments

Comments
 (0)