You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
hmz007 36ed224bac
Rockchip Anroid14_SDK 20240628-rkr5 (2556df1a)
1 year ago
..
fuzzer_support_ios Rockchip Anroid14_SDK 20240628-rkr5 (2556df1a) 1 year ago
fuzzers Rockchip Anroid14_SDK 20240628-rkr5 (2556df1a) 1 year ago
proto Rockchip Anroid14_SDK 20240628-rkr5 (2556df1a) 1 year ago
tests Rockchip Anroid14_SDK 20240628-rkr5 (2556df1a) 1 year ago
AFL_integration.md Rockchip Anroid14_SDK 20240628-rkr5 (2556df1a) 1 year ago
BUILD.gn Rockchip Anroid14_SDK 20240628-rkr5 (2556df1a) 1 year ago
README.md Rockchip Anroid14_SDK 20240628-rkr5 (2556df1a) 1 year ago
archive_corpus.py Rockchip Anroid14_SDK 20240628-rkr5 (2556df1a) 1 year ago
dictionary_generator.py Rockchip Anroid14_SDK 20240628-rkr5 (2556df1a) 1 year ago
efficient_fuzzing.md Rockchip Anroid14_SDK 20240628-rkr5 (2556df1a) 1 year ago
expose_fuzzer_run_driver.cc Rockchip Anroid14_SDK 20240628-rkr5 (2556df1a) 1 year ago
fuzzer_test.gni Rockchip Anroid14_SDK 20240628-rkr5 (2556df1a) 1 year ago
fuzzing_browsertests.md Rockchip Anroid14_SDK 20240628-rkr5 (2556df1a) 1 year ago
gen_fuzzer_config.py Rockchip Anroid14_SDK 20240628-rkr5 (2556df1a) 1 year ago
gen_fuzzer_owners.py Rockchip Anroid14_SDK 20240628-rkr5 (2556df1a) 1 year ago
getting_started.md Rockchip Anroid14_SDK 20240628-rkr5 (2556df1a) 1 year ago
libFuzzer_integration.md Rockchip Anroid14_SDK 20240628-rkr5 (2556df1a) 1 year ago
libfuzzer_exports.h Rockchip Anroid14_SDK 20240628-rkr5 (2556df1a) 1 year ago
libprotobuf-mutator.md Rockchip Anroid14_SDK 20240628-rkr5 (2556df1a) 1 year ago
reference.md Rockchip Anroid14_SDK 20240628-rkr5 (2556df1a) 1 year ago
reproducing.md Rockchip Anroid14_SDK 20240628-rkr5 (2556df1a) 1 year ago
unittest_main.cc Rockchip Anroid14_SDK 20240628-rkr5 (2556df1a) 1 year ago
zip_sources.py Rockchip Anroid14_SDK 20240628-rkr5 (2556df1a) 1 year ago

README.md

Fuzz testing in Chromium

go/chrome-fuzzing

Fuzzing is a testing technique that feeds auto-generated inputs to a piece of target code in an attempt to crash the code. It's one of the most effective methods we have for finding security and stability issues (see go/fuzzing-success). You can learn more about the benefits of fuzzing at go/why-fuzz.

This documentation covers the in-process guided fuzzing approach employed by different fuzzing engines, such as libFuzzer or AFL. To learn more about out-of-process fuzzers, please refer to the Blackbox fuzzing page in the ClusterFuzz documentation.

[TOC]

Getting Started

In Chromium, you can easily create and submit fuzz targets. The targets are automatically discovered by buildbots, built with different fuzzing engines, then uploaded to the distributed ClusterFuzz fuzzing system to run at scale.

Create your first fuzz target and submit it by stepping through our Getting Started Guide.

Advanced Topics

Further Reading

Trophies