tags:fuzzingmethodologyemulation original link: Fuzzer Development: Sandboxing Syscalls newsletter link: exploits.club Weekly Newsletter 09


Exploits Club Summary:

@hombre put out his second part of the “Fuzzer Development” series he is running on his blog. The fuzzer sandboxes a Bochs emulator for easy system emulation and snapshot fuzzing. This post details the implementation of the “Bochs-to-fuzzer context switch”, which takes place in order to handle syscalls.