tags:fuzzingmethodologyemulation original link: Fuzzer Development: Sandboxing Syscalls newsletter link: exploits.club Weekly Newsletter 09
Exploits Club Summary:
@hombre put out his second part of the âFuzzer Developmentâ series he is running on his blog. The fuzzer sandboxes a Bochs emulator for easy system emulation and snapshot fuzzing. This post details the implementation of the âBochs-to-fuzzer context switchâ, which takes place in order to handle syscalls.