US 12,271,484 B2
Fuzzing guided binary hardening
Michael Vu Le, Danbury, CT (US); and Sanjeev Das, White Plains, NY (US)
Assigned to International Business Machines Corporation, Armonk, NY (US)
Filed by INTERNATIONAL BUSINESS MACHINES CORPORATION, Armonk, NY (US)
Filed on Jul. 13, 2022, as Appl. No. 17/812,190.
Prior Publication US 2024/0020389 A1, Jan. 18, 2024
Int. Cl. G06F 21/00 (2013.01); G06F 21/56 (2013.01); G06F 21/57 (2013.01)
CPC G06F 21/577 (2013.01) [G06F 21/568 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method comprising:
generating application traces using fuzzing for an application with a known security vulnerability, wherein the application traces include good traces that do not result in exploitation of the known security vulnerability and bad traces that result in exploitation of the known security vulnerability;
identifying code segments that are executed by the bad traces and not executed by the good traces; and
modifying the identified code segments using binary rewriting.