Max Eisele

13 posts

Max Eisele

Max Eisele

@MaxCamillo

Beigetreten Şubat 2010
72 Folgt69 Follower
Max Eisele retweetet
Irina Nicolae
Irina Nicolae@ririnicolae·
@DongdongShe You seem happy enough to communicate in the public channel: you’re the one who took this to Twitter and shared private conversations. If you’re going to share emails, might as well do so in full and not cherry-pick:
Irina Nicolae tweet media
Dongdong She@DongdongShe

Ep5. Rebuttal MLFuzz Thanks Irina’s response. We never heard back from you and @AndreasZeller since last month when we sent the last email to ask if you guys were willing to write an errata of MLFuzz to acknowledge the bugs and wrong conclusion. So I am happy to communicate with you in the public channel about this issue and clarify the misleading conclusions in your paper MLFuzz in front of the fuzzing community. Our first email pointed out 4 bugs in MLFuzz and we showed that if you fixed the 4 bugs you can successfully reproduce our results. We also provide a fixed version of your code and preliminary results on 4 FuzzBench programs. Your first response confirmed 3 bugs but refused to acknowledge the most severe one – an error in training data collection. For any ML model, garbage in, garbage out. If you manipulate the training data distribution, you can cook any arbitrary poor results for an ML model. Why are you reluctant to fix the training data collection error? Instead, you insist on running NEUZZ with the WRONG training data and cooking invalid results even though we already notified you of this issue. We suspect maybe that’s the only way to keep reproducing your wrong experiment results and avoid acknowledging your error in MLFuzz. Your research conduct raised a serious issue about how to properly reproduce fuzzing performance in the Fuzzing community. Devil’s advice: blindly, deliberately or stealthily run it with WRONG settings or patch it with a few bugs and claim its performance does not hold? Only an ill-configured fuzzer is a good baseline fuzzer. We think a fair and scientific way to reproduce/revisit a fuzzer should ensure running a fuzzer properly as the original paper did, rather than free-style wrong settings and bug injections. The fact is you guys wrote buggy code (you confirmed in the email) and cooked invalid results and wrong conclusions published in a top-tier conference @FSEconf 2023. We wrote a rebuttal to point out 4 fatal bugs in your code and wrong conclusions. A responsible and professional response should directly address our questions about the 4 fatal bugs and wrong conclusions. But your response discussed the inconsistent performance number issue of NEUZZ (due to a different metric choice), the benchmark, seed corpus, IID issue of MLFuzz. They are research questions about NEUZZ and MLFuzz, but they are not the topic of this post: MLFuzz rebuttal. They can only shift the audience's attention but cannot fix the bugs and errors in MLFuzz. I promise I will address every question in your response in a separate post on X, but not in this one. Stay tuned! @is_eqv @moyix @thorstenholz @mboehme_

English
1
3
12
2.6K
Max Eisele retweetet
Irina Nicolae
Irina Nicolae@ririnicolae·
Recently, @DongdongShe et al. raised issues regarding our paper “Revisiting Neural Program Smoothing for Fuzzing”. Tldr: they highlight two bugs in our code, make inaccurate statements, and ignore all the core issues we raised 🧵: 1/
English
1
10
35
17.9K
Max Eisele retweetet
Andreas Zeller
Andreas Zeller@AndreasZeller·
Congratulations to my PhD student Max Eisele for winning the @sigsoft/@AcmSigbed Frank Anger Award! @MaxCamillo works on testing and analyzing embedded systems at Bosch. He is best known so far for GDBFuzz, a GDB-based fuzzer for embedded systems medium.com/security-garte…
ACM SIGSOFT@sigsoft

Excited to announce ACM SIGSOFT Awards 2024!!! Congratulations to all winners for their significant contributions! Here is the blog post by the Awards chair @davidlo2015 and @sigsoft chair @tomzimmermann 👋👋👋 @sigsoft/sigsoft-awards-2024-ce34b9ee23a6" target="_blank" rel="nofollow noopener">medium.com/@sigsoft/sigso… A serious of posts to follow!

English
0
2
76
5.3K
Max Eisele retweetet
Andreas Zeller
Andreas Zeller@AndreasZeller·
In one year of work, @ririnicolae, @MaxCamillo, and I have deconstructed the controversial NEUZZ ML-based fuzzer and found that its original performance claims do not hold. Looking forward to lively discussions today 12:15 at @FSEconf! dl.acm.org/doi/10.1145/36…
Andreas Zeller tweet media
dmnk.bsky.social@domenuk

She's right: I have seen _not a single_ ML-based approach that outperforms traditional fuzzing - and many have tried. Can't we just call all fuzzers AI and get the funding anyway?

English
2
14
123
50.2K
Max Eisele
Max Eisele@MaxCamillo·
@soaphornseuo GDBFuzz can send fuzz data via any interface you can address from Python. Currently we implemented Serial (UART), USB MSC + CTRL, and TCP. Coverage-feedback is retrieved via a separate GDB connection
English
0
0
0
20
soaphorn seuo
soaphorn seuo@soaphornseuo·
@MaxCamillo I have some questions related to your research, GDBfuzz fuzzing direct from PC to Device through UART or required emulator?
English
1
0
0
79
Max Eisele
Max Eisele@MaxCamillo·
I just published a summary of our tool "GDBFuzz", which enables fuzzing of embedded systems on a scale using the standard GDB remote protocol and hardware breakpoints: link.medium.com/8DZ2zmSInAb
English
1
20
57
6.4K
Max Eisele
Max Eisele@MaxCamillo·
Based on this observation, we implemented GDBFuzz, which orchestrates the fuzzing process and controls debug units via the standard GDB remote serial protocol. A preprint is already available at publications.cispa.saarland/3950/
English
0
0
5
266
Max Eisele
Max Eisele@MaxCamillo·
Essentially, we show that the limited amount of hardware breakpoints typically present in microcontrollers suffice to perform coverage-guided fuzzing independent from processor architecture.
English
1
0
2
294
Max Eisele
Max Eisele@MaxCamillo·
Happy to announce that our paper "Fuzzing Embedded Systems using Debug Interfaces" is accepted at #ISSTA2023 ! In the paper, we present our debugger-driven fuzzer GDBFuzz , which leverages hardware breakpoints to gain coverage feedback. @AndreasZeller
English
1
3
18
21.4K