Get Coursera Plus for 40% off
Power BI Fundamentals - Create visualizations and dashboards from scratch
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn to fuzz the libexif library in this 11-minute hands-on tutorial that demonstrates practical fuzzing techniques for finding security vulnerabilities in image processing software. Apply mutation-based, generation-based, and coverage-guided fuzzing approaches specifically to libexif, a library commonly used for reading and writing EXIF metadata in image files. Follow along with AFL-driven workflows to discover potential crashes and unexpected behavior in this real-world target. Practice setting up fuzzing environments, running effective fuzz campaigns against libexif functions, and interpreting crash results to identify security issues. Gain experience with instrumentation techniques and sanitizers including ASAN, PCGUARD, and LTO builds while targeting this widely-used image metadata library. Master the practical skills needed to conduct thorough security testing of libraries that handle untrusted input data, preparing you to identify and report vulnerabilities in similar software components.
Syllabus
Fuzz1001 05 02 libexif
Taught by
OpenSecurityTraining2